Click here to download all references as Bib-File.•
2025-05-21
⋅
Bleeping Computer
⋅
Russia to enforce location tracking app on all foreigners in Moscow |
2025-05-20
⋅
European Council
⋅
Russian hybrid threats: EU lists further 21 individuals and 6 entities and introduces sectoral measures in response to destabilising activities against the EU, its member states and international partners |
2025-05-20
⋅
⋅
Kaspersky
⋅
https://securelist.ru/purerat-attacks-russian-organizations/112619/ PureLogs Stealer |
2025-05-20
⋅
Acronis
⋅
From banks to battalions: SideWinder’s attacks on South Asia’s public sector |
2025-05-19
⋅
The DFIR Report
⋅
Another Confluence Bites the Dust: Falling to ELPACO-team Ransomware Mimic Ransomware MimiKatz |
2025-05-19
⋅
GitHub - Adaptix-Framework//AdaptixC2 AdaptixC2 |
2025-05-17
⋅
Denwp Research
⋅
More_Eggs? A Venom Spider Backdoor Targeting HR More_eggs |
2025-05-14
⋅
⋅
LAC
⋅
Continued EAGERBEE (Thumtais) malware activity EagerBee |
2025-05-13
⋅
Trend Micro
⋅
Earth Ammit Disrupts Drone Supply Chains Through Coordinated Multi-Wave Attacks in Taiwan |
2025-05-13
⋅
EclecticIQ
⋅
China-Nexus Nation State Actors Exploit SAP NetWeaver (CVE-2025-31324) to Target Critical Infrastructures KrustyLoader SNOWLIGHT Vshell |
2025-05-13
⋅
Cisco Talos
⋅
Defining a new methodology for modeling and tracking compartmentalized threats |
2025-05-12
⋅
Synacktiv
⋅
Open-source toolset of an Ivanti CSA attacker HTran iox reGeorg |
2025-05-12
⋅
ESET Research
⋅
ESET APT Activity Report Q4 2024–Q1 2025 BeaverTail InvisibleFerret GolangGhost |
2025-05-12
⋅
Genians
⋅
Analysis of APT37 Attack Case Disguised as a Think Tank for National Security Strategy in South Korea (Operation. ToyBox Story) RokRAT |
2025-05-10
⋅
cocomelonc
⋅
Malware development trick 47: simple Windows clipboard hijacking. Simple C example. CosmicDuke RokRAT |
2025-05-09
⋅
Lumen
⋅
Classic Rock: Hunting a Botnet that preys on the Old |
2025-05-08
⋅
DataBreaches.net
⋅
Negotiations with the Akira ransomware group: an ill-advised approach Akira |
2025-05-08
⋅
Fortinet
⋅
Multilayered Email Attack: How a PDF Invoice and Geo-Fencing Led to RAT Malware Ratty |
2025-05-08
⋅
Forescout
⋅
Threat Analysis: SAP Vulnerability Exploited in the Wild by Chinese Threat Actor Chaya_004 |
2025-05-07
⋅
FBI
⋅
Cyber Criminal Services Target End-of-Life Routers to Launch Attacks and Hide Their Activities TheMoon |