Click here to download all references as Bib-File.•
2025-03-13
⋅
Infoblox
⋅
Work Hard, Pay Harder! |
2025-03-13
⋅
Tinyhack.com
⋅
Decrypting Encrypted files from Akira Ransomware (Linux/ESXI variant 2024) using a bunch of GPUs Akira |
2025-03-13
⋅
Group-IB
⋅
ClickFix: The Social Engineering Technique Hackers Use to Manipulate Victims Emmenhtal Lumma Stealer |
2025-03-13
⋅
Linkedin (ThreatMon)
⋅
Chrome DLL Manipulation Attack Exposed |
2025-03-12
⋅
Youtube (AhmedS Kasmani)
⋅
Initial Analysis of Black Basta Chat Leaks Black Basta Black Basta |
2025-03-12
⋅
YouTube (John Hammond)
⋅
LEAKED Russian Hackers Internal Chats Black Basta Black Basta |
2025-03-12
⋅
Mandiant
⋅
Ghost in the Router: China-Nexus Espionage Actor UNC3886 Targets Juniper Routers tsh |
2025-03-12
⋅
Lookout
⋅
Lookout Discovers New Spyware by North Korean APT37 KoSpy |
2025-03-11
⋅
Cato Networks
⋅
Cato CTRL Threat Research: Ballista – New IoT Botnet Targeting Thousands of TP-Link Archer Routers Ballista |
2025-03-11
⋅
Juniper Networks
⋅
The RedPenguin Malware Incident tsh |
2025-03-11
⋅
Github (prodaft)
⋅
IOCs for Anubis Backdoor Anubis Backdoor |
2025-03-11
⋅
The Hacker News
⋅
Blind Eagle Hacks Colombian Institutions Using NTLM Flaw, RATs and GitHub-Based Attacks AsyncRAT NjRAT Quasar RAT Remcos |
2025-03-11
⋅
Trend Micro
⋅
AI-Assisted Fake GitHub Repositories Fuel SmartLoader and LummaStealer Distribution Lumma Stealer SmartLoader |
2025-03-11
⋅
Kaspersky Labs
⋅
DCRat backdoor returns DCRat |
2025-03-11
⋅
ThreatMon
⋅
New Ermac Variant - Android Banking Trojan & Botnet ERMAC |
2025-03-10
⋅
LevelBlue
⋅
Prevent, Detect, Contain: LevelBlue MDR’s Guide Against Black Basta Affiliates’ Attacks Black Basta Black Basta ReedBed |
2025-03-10
⋅
Check Point Research
⋅
Blind Eagle: …And Justice for All Remcos |
2025-03-10
⋅
Socket
⋅
Lazarus Strikes npm Again with New Wave of Malicious Packages |
2025-03-07
⋅
Proofpoint
⋅
Remote Monitoring and Management (RMM) Tooling Increasingly an Attacker’s First Choice |
2025-03-07
⋅
MalwareAnalysisSpace
⋅
Akira Ransomware Expands to Linux: the attacking abilities and strategies Akira |