Click here to download all references as Bib-File.•
2025-03-13
⋅
Linkedin (ThreatMon)
⋅
Chrome DLL Manipulation Attack Exposed |
2025-03-11
⋅
Twitter (@ESETresearch)
⋅
Twitter Thread about PipeMagic PipeMagic |
2025-03-11
⋅
Cato Networks
⋅
Cato CTRL Threat Research: Ballista – New IoT Botnet Targeting Thousands of TP-Link Archer Routers Ballista |
2025-03-11
⋅
ThreatMon
⋅
New Ermac Variant - Android Banking Trojan & Botnet ERMAC |
2025-03-10
⋅
Check Point Research
⋅
Blind Eagle: …And Justice for All Remcos |
2025-03-07
⋅
Proofpoint
⋅
Remote Monitoring and Management (RMM) Tooling Increasingly an Attacker’s First Choice |
2025-02-27
⋅
Check Point Research
⋅
Modern Approach to Attributing Hacktivist Groups |
2025-02-26
⋅
ThreatMon
⋅
FOG Ransomware Attacks the Energy Sector in Turkey Fog |
2025-02-20
⋅
ESET Research
⋅
DeceptiveDevelopment targets freelance developers BeaverTail InvisibleFerret |
2025-02-20
⋅
Infrawatch
⋅
GhostSocks - Lumma's Partner In Proxy GhostSocks Lumma Stealer |
2025-02-19
⋅
Natto Thoughts
⋅
The Pangu Team—iOS Jailbreak and Vulnerability Research Giant: A Member of i-SOON’s Exploit-Sharing Network |
2025-02-18
⋅
Proofpoint
⋅
An Update on Fake Updates: Two New Actors, and New Mac Malware Marcher FAKEUPDATES FrigidStealer Lumma Stealer |
2025-01-23
⋅
ThreatMon
⋅
Helldown Ransomware Malware Analysis Report HellDown |
2025-01-22
⋅
ESET Research
⋅
PlushDaemon compromises supply chain of Korean VPN service SlowStepper PlushDaemon |
2025-01-13
⋅
Halcyon
⋅
Abusing AWS Native Services: Ransomware Encrypting S3 Buckets with SSE-C Codefinger |
2025-01-10
⋅
Check Point Research
⋅
FunkSec – Alleged Top Ransomware Group Powered by AI FunkSec |
2025-01-08
⋅
ThreatMon
⋅
Akira Ransomware Group & Malware Analysis Report Akira |
2024-12-18
⋅
KELA
⋅
Three Months After the Storm: Did Cybercriminals Move to Telegram Alternatives? |
2024-12-16
⋅
Zscaler
⋅
Technical Analysis of RiseLoader RiseLoader |
2024-12-14
⋅
Axel's IT Security Research
⋅
How to Identify XenoRAT C2 Servers XenoRAT |