Click here to download all references as Bib-File.•
2025-08-12
⋅
The New York Times
⋅
Russia Is Suspected to Be Behind Breach of Federal Court Filing System |
2025-08-12
⋅
bluecyber
⋅
Analysis of a ClickFix malware attack Vidar |
2025-08-10
⋅
cocomelonc
⋅
MacOS hacking part 8: dlopen() code loading + finding target PIDs. Simple C (Intel, ARM) examples |
2025-08-05
⋅
Defentive
⋅
Lost in Translation: Threat Actors Use SEO Poisoning and Fake DeepL Sites to Distribute Gh0st RAT Ghost RAT |
2025-08-03
⋅
Reverse The Malware
⋅
One Click and You're Caught: HoneyFiles in Action |
2025-08-02
⋅
cocomelonc
⋅
MacOS hacking part 7: Minimal Linux-style shellcode on macOS (Intel). Simple NASM (Intel) and C examples |
2025-08-02
⋅
Reverse The Malware
⋅
Analysis of a Facebook Phishing Page |
2025-08-01
⋅
Nextron Systems
⋅
Plague: A Newly Discovered PAM-Based Backdoor for Linux Plague |
2025-07-31
⋅
Reverse The Malware
⋅
SysTracer: Another Suite for Digital Forensics and Incident Response |
2025-07-31
⋅
Reverse The Malware
⋅
ArtiFast Forensics Artifacts Investigation - ShellBags |
2025-07-30
⋅
cocomelonc
⋅
Mobile malware development trick 2. Abuse Telegram Bot API: Contacts. Simple Android (Java/Kotlin) stealer example. |
2025-07-30
⋅
GBHackers on Security
⋅
Lazarus Group enhances malware delivery by using new techniques OtterCookie |
2025-07-29
⋅
Foresiet
⋅
AURA Stealer: A Crude Clone of LummaC2 – Technical Analysis and Threat Breakdown Aura Stealer |
2025-07-28
⋅
Kyiv Independent
⋅
Hacker group claims responsibility for cyberattack on Russia's Aeroflot |
2025-07-27
⋅
Bleeping Computer
⋅
Scattered Spider is running a VMware ESXi hacking spree |
2025-07-26
⋅
Reverse The Malware
⋅
User History Artifact : Practical Gathering of Artifacts |
2025-07-26
⋅
Reverse The Malware
⋅
Forensic Artifacts for User Windows History Activity |
2025-07-25
⋅
Cloudsek
⋅
Threat Actors Lure Victims Into Downloading .HTA Files Using ClickFix To Spread Epsilon Red Ransomware Epsilon Red |
2025-07-24
⋅
The Washington Times
⋅
Hackers breach intelligence website used by CIA |
2025-07-24
⋅
Bleeping Computer
⋅
BlackSuit ransomware extortion sites seized in Operation Checkmate BlackSuit Royal Ransom BlackSuit Mount Locker Royal Ransom |