Click here to download all references as Bib-File.•
2025-02-27
⋅
WAR ON THE ROCKS
⋅
The Rise of the Fake Tech Workforce: State-Sponsored Infiltration of U.S. Technical Supply Chains |
2025-02-27
⋅
Fortinet
⋅
Winos 4.0 Spreads via Impersonation of Official Email to Target Users in Taiwan ValleyRAT Winos |
2025-02-27
⋅
Microsoft
⋅
Disrupting a global cybercrime network abusing generative AI Storm-2139 |
2025-02-27
⋅
Cyber Geeks
⋅
Russian campaign targeting Romanian WhatsApp numbers |
2025-02-27
⋅
Medium b.magnezi
⋅
NanoCore Malware Analysis Nanocore RAT |
2025-02-27
⋅
Securite360.net
⋅
How Long Can a Vulnerable Server Stay Clean on the Internet? A Honeypot Tale RedTail |
2025-02-26
⋅
ThreatMon
⋅
FOG Ransomware Attacks the Energy Sector in Turkey STOP |
2025-02-26
⋅
FBI
⋅
Alert Number: I-022625-PSA - North Korea Responsible for $1.5 Billion Bybit Hack |
2025-02-26
⋅
POLITICO
⋅
Chinese hackers siphoned off Belgian state security emails, report says |
2025-02-26
⋅
Medium extensiontotal
⋅
A Wolf in Dark Mode: The Malicious VS Code Theme That Fooled Millions |
2025-02-25
⋅
PolarEdge: Unveiling an uncovered ORB network PolarEdge |
2025-02-25
⋅
Sentinel LABS
⋅
Ghostwriter | New Campaign Targets Ukrainian Government and Belarusian Opposition |
2025-02-24
⋅
Palo Alto Networks Unit 42
⋅
Auto-Color: An Emerging and Evasive Linux Backdoor |
2025-02-24
⋅
EUR-Lex
⋅
Council Implementing Regulation (EU) 2025/389 of 24 February 2025 implementing Regulation (EU) No 269/2014 concerning restrictive measures in respect of actions undermining or threatening the territorial integrity, sovereignty and independence of Ukraine |
2025-02-24
⋅
SecurityScorecard
⋅
Massive Botnet Targets M365 with Stealthy Password Spraying Attacks |
2025-02-24
⋅
Intel 471
⋅
Android trojan TgToxic updates its capabilities TgToxic |
2025-02-24
⋅
cocomelonc
⋅
Malware development trick 45: hiding and extracting payload in PNGs (with cats). Simple C example. OceanLotus DuQu StegoLoader |
2025-02-24
⋅
K7 Security
⋅
LCRYX Ransomware: How a VB Ransomware Locks Your System LCRYX |
2025-02-24
⋅
Kaspersky Labs
⋅
The GitVenom campaign: cryptocurrency theft using GitHub AsyncRAT Quasar RAT |
2025-02-24
⋅
Medium SlowMist
⋅
Cryptocurrency APT Intelligence: Unveiling Lazarus Group’s Intrusion Techniques |