Click here to download all references as Bib-File.•
2025-07-27
⋅
Medium RaghavtiResearch
⋅
Lumma Stealer — A Proliferating Threat in the Cybercrime Landscape Lumma Stealer |
2025-07-25
⋅
Cloudsek
⋅
Threat Actors Lure Victims Into Downloading .HTA Files Using ClickFix To Spread Epsilon Red Ransomware Epsilon Red |
2025-07-22
⋅
Microsoft
⋅
Disrupting active exploitation of on-premises SharePoint vulnerabilities Storm-2603 |
2025-07-16
⋅
Proofpoint
⋅
Phish and Chips: China-Aligned Espionage Actors Ramp Up Taiwan Semiconductor Industry Targeting Cobalt Strike Voldemort |
2025-07-14
⋅
Arda Büyükkaya
⋅
GLOBAL GROUP: Emerging Ransomware-as-a-Service, Supporting AI Driven Negotiation and Mobile Control Panel for Their Affiliates Global |
2025-07-08
⋅
Acronis
⋅
SafePay ransomware: the fast rising threat targeting MSPs SafePay |
2025-07-01
⋅
CERT-IL
⋅
DevMan Ransomware Threat Actor Report DEVMAN |
2025-06-30
⋅
Microsoft
⋅
Jasper Sleet: North Korean remote IT workers’ evolving tactics to infiltrate organizations |
2025-06-24
⋅
Bridewell
⋅
2025 Cyber Threat Intelligence Report AsyncRAT Brute Ratel C4 Cobalt Strike Fog Ghost RAT Lumma Stealer Meduza Stealer Quasar RAT RedLine Stealer Sliver |
2025-06-23
⋅
Gdata
⋅
ConnectUnwise: Threat actors abuse ConnectWise as builder for signed malware EvilConwi |
2025-06-23
⋅
Rushter
⋅
Threat Hunting Introduction: Cobalt Strike Cobalt Strike |
2025-06-20
⋅
Twitter (@threatintel)
⋅
Tweet about wiper deployed against Albania by Druidfly |
2025-06-19
⋅
Government of Canada
⋅
Cyber threat bulletin: People's Republic of China cyber threat activity: PRC cyber actors target telecommunications companies as part of a global cyberespionage campaign |
2025-06-18
⋅
Securonix
⋅
Analyzing SERPENTINE#CLOUD: Threat Actors Abuse Cloudflare Tunnels to Infect Systems with Stealthy Python-Based Malware |
2025-06-16
⋅
Proofpoint
⋅
Amatera Stealer: Rebranded ACR Stealer With Improved Evasion, Sophistication ACR Stealer Amatera |
2025-06-12
⋅
Infoblox
⋅
Vexing and Vicious: The Eerie Relationship between WordPress Hackers and an Adtech Cabal DollyWay |
2025-06-12
⋅
Symantec
⋅
Fog Ransomware: Unusual Toolset Used in Recent Attack Fog |
2025-06-10
⋅
Twitter (@threatinsight)
⋅
Tweet regarding Aurotun / MonsterV2 Aurotun Stealer |
2025-06-09
⋅
Sentinel LABS
⋅
Follow the Smoke | China-nexus Threat Actors Hammer At the Doors of Top Tier Targets GOREshell Nimbo-C2 ShadowPad |
2025-06-09
⋅
Genians
⋅
Analysis of the Triple Combo Threat of the Kimsuky Group FlowerPower Appleseed BabyShark |