Click here to download all references as Bib-File.•
2025-03-25
⋅
Kaspersky Labs
⋅
Operation ForumTroll: APT attack with Google Chrome zero-day exploit chain Operation ForumTroll |
2025-03-25
⋅
SpyCloud
⋅
On the Hunt for Ghost(Socks) GhostSocks |
2025-03-24
⋅
SYGNIA
⋅
Weaver Ant, the Web Shell Whisperer: Tracking a Live China-nexus Operation CHINACHOPPER reGeorg |
2025-03-23
⋅
AviaB
⋅
Analyzing Vidar Stealer Vidar |
2025-03-22
⋅
Trend Micro
⋅
Back to Business: Lumma Stealer Returns with Stealthier Methods Lumma Stealer |
2025-03-20
⋅
Cisco Talos
⋅
UAT-5918 targets critical infrastructure entities in Taiwan ShortLeash LaZagne JuicyPotato Meterpreter MimiKatz ShortLeash UAT-5918 |
2025-03-20
⋅
ESET Research
⋅
Operation FishMedley ShadowPad SodaMaster Spyder Earth Lusca FishMedley |
2025-03-20
⋅
Denwp Research
⋅
Reversing FUD AMOS Stealer AMOS |
2025-03-19
⋅
cocomelonc
⋅
MD MZ Book: Russian translation |
2025-03-19
⋅
Natto Thoughts
⋅
Zhou Shuai: A Hacker’s Road to APT27 |
2025-03-18
⋅
Trellix
⋅
Analysis of Black Basta Ransomware Chat Leaks Black Basta Black Basta |
2025-03-18
⋅
Expel
⋅
Code-signing certificate abuse in the Black Basta chat leaks (and how to fight back) Black Basta Black Basta |
2025-03-18
⋅
WeLiveSecurity
⋅
Operation AkaiRyū: MirrorFace invites Europe to Expo 2025 and revives ANEL backdoor Anel AsyncRAT |
2025-03-17
⋅
GoDaddy
⋅
DollyWay World Domination: Eight Years of Evolving Website Malware Campaigns DollyWay |
2025-03-17
⋅
Cloudflare
⋅
Black Basta’s blunder: exploiting the gang’s leaked chats Black Basta Black Basta |
2025-03-16
⋅
SYGNIA
⋅
Bybit – What We Know So Far |
2025-03-16
⋅
Analyzing the RedTiger Malware Stealer RedTiger Stealer |
2025-03-15
⋅
DeXpose
⋅
Understanding SalatStealer: Features and Impact SalatStealer |
2025-03-15
⋅
Github (TheRavenFile)
⋅
IoCs for Anubis Backdoor Anubis Backdoor |
2025-03-14
⋅
bluecyber
⋅
PlugX: Bad guy disguises as an msi file PlugX |