Click here to download all references as Bib-File.•
| 2025-10-15
⋅
NTT
⋅
OtterCandy, malware used by WaterPlum OtterCandy |
| 2025-10-15
⋅
Trend Micro
⋅
Operation Zero Disco: Attackers Exploit Cisco SNMP Vulnerability to Deploy Rootkits |
| 2025-10-14
⋅
⋅
Synacktiv
⋅
LinkPro: analysis of an eBPF rootkit LinkPro vGet |
| 2025-10-14
⋅
Reliaquest
⋅
SOE-phisticated Persistence: Inside Flax Typhoon's ArcGIS Compromise |
| 2025-10-14
⋅
Gatewatcher
⋅
Data Breach: the operations of "Charming Kitten" revealed |
| 2025-10-13
⋅
⋅
Logpresso
⋅
[Threat Analysis] Lazarus Group Analyzes Malware for Windows and MacOS |
| 2025-10-13
⋅
SpyCloud
⋅
More Than Meets the YY: Analyzing the YYlaiyu PhaaS Panel |
| 2025-10-13
⋅
NCSC UK
⋅
Malware Analysis Report: RayInitiator & LINE VIPER |
| 2025-10-13
⋅
Proofpoint
⋅
When the monster bytes: tracking TA585 and its arsenal MonsterV2 |
| 2025-10-10
⋅
Malcat
⋅
Malcat scripting tutorial: deobfuscating Latrodectus Latrodectus |
| 2025-10-10
⋅
Socket
⋅
North Korea’s Contagious Interview Campaign Escalates: 338 Malicious npm Packages, 50,000 Downloads BeaverTail InvisibleFerret |
| 2025-10-10
⋅
⋅
Gatewatcher
⋅
Fuite de données: les opérations de "Charming Kitten" révélées |
| 2025-10-07
⋅
Rapid7
⋅
Crimson Collective: A New Threat Group Observed Operating in the Cloud |
| 2025-10-07
⋅
Aryaka Networks
⋅
Vietnamese Threat Group Uses Vampire Bot to Target Digital Professionals Vampire Bot |
| 2025-10-07
⋅
Cybernews
⋅
Steam, Riot Games hit by disruptions: massive DDoS attack suspected Aisuru |
| 2025-10-06
⋅
Microsoft
⋅
Investigating active exploitation of CVE-2025-10035 GoAnywhere Managed File Transfer vulnerability MedusaLocker |
| 2025-10-06
⋅
Recorded Future
⋅
BIETA: A Technology Enablement Front for China's MSS |
| 2025-10-06
⋅
BlackPoint
⋅
Malicious Node Package Deploys OtterCookie OtterCookie |
| 2025-10-03
⋅
Techzine
⋅
What we know so far about Red Hat’s GitLab instance breach Crimson Collective |
| 2025-10-02
⋅
Trellix
⋅
XWorm V6: Exploring Pivotal Plugins XWorm |