Click here to download all references as Bib-File.•
2025-05-13
⋅
CSA
⋅
Intrusion Insights Straight from Leaked Operator Chats LockBit LockBit LockBit |
2025-05-13
⋅
Gdata
⋅
Sit, Fetch, Steal - Chihuahua Stealer: A new Breed of Infostealer Chihuahua |
2025-05-12
⋅
Seqrite
⋅
Unveiling Swan Vector APT Targeting Taiwan and Japan with varied DLL Implants Pterois Swan Vector |
2025-05-12
⋅
ESET Research
⋅
ESET APT Activity Report Q4 2024–Q1 2025 BeaverTail InvisibleFerret GolangGhost |
2025-05-12
⋅
Genians
⋅
Analysis of APT37 Attack Case Disguised as a Think Tank for National Security Strategy in South Korea (Operation. ToyBox Story) RokRAT |
2025-05-09
⋅
Lumen
⋅
Classic Rock: Hunting a Botnet that preys on the Old |
2025-05-09
⋅
US Department of Justice
⋅
Botnet Dismantled in International Operation, Russian and Kazakhstani Administrators Indicted TheMoon |
2025-05-09
⋅
Lumen
⋅
Classic Rock: Hunting a Botnet that preys on the Old |
2025-05-09
⋅
Sophos X-Ops
⋅
Lumma Stealer, coming and going Lumma Stealer |
2025-05-08
⋅
DataBreaches.net
⋅
Negotiations with the Akira ransomware group: an ill-advised approach Akira |
2025-05-08
⋅
WithSecure
⋅
KeePass trojanised in advanced malware campaign Nitrogen Loader |
2025-05-08
⋅
Fortinet
⋅
Multilayered Email Attack: How a PDF Invoice and Geo-Fencing Led to RAT Malware Ratty |
2025-05-08
⋅
Forescout
⋅
Threat Analysis: SAP Vulnerability Exploited in the Wild by Chinese Threat Actor Chaya_004 |
2025-05-07
⋅
Google
⋅
COLDRIVER Using New Malware To Steal Documents From Western Targets and NGOs LOSTKEYS |
2025-05-07
⋅
Europol
⋅
DDoS-for-hire empire brought down: Poland arrests 4 administrators, US seizes 9 domains |
2025-05-07
⋅
US Department of Justice
⋅
Case 4:25-cr-00160-JDR: Indictment of Alexey Viktorovich Chertkov, Kirill Vladimirovich Morozov, Aleksandr Aleksandrovich Shishkin and Dmitriy Rubtsov TheMoon |
2025-05-07
⋅
FBI
⋅
Cyber Criminal Services Target End-of-Life Routers to Launch Attacks and Hide Their Activities TheMoon |
2025-05-07
⋅
FBI
⋅
Alert Number: I-050725-PSA Cyber Criminal Proxy Services Exploiting End of Life Routers TheMoon |
2025-05-07
⋅
Palo Alto Networks Unit 42
⋅
Iranian Cyber Actors Impersonate Model Agency in Suspected Espionage Operation APT35 |
2025-05-07
⋅
NTT Security
⋅
Additional Features of OtterCookie Malware Used by WaterPlum BeaverTail OtterCookie InvisibleFerret |