Click here to download all references as Bib-File.•
2025-05-07
⋅
Palo Alto Networks Unit 42
⋅
Iranian Cyber Actors Impersonate Model Agency in Suspected Espionage Operation APT35 |
2025-05-07
⋅
NTT Security
⋅
Additional Features of OtterCookie Malware Used by WaterPlum BeaverTail OtterCookie InvisibleFerret |
2025-05-06
⋅
Akamai
⋅
Here Comes Mirai: IoT Devices RSVP to Active Exploitation LZRD |
2025-05-06
⋅
Infoblox
⋅
Telegram Tango: Dancing with a Scammer |
2025-05-06
⋅
NCSC Switzerland
⋅
Cybersecurity: Situation in Switzerland and internationally - Semi-Annual Report 2024/II |
2025-05-05
⋅
BleepingComputer
⋅
New "Bring Your Own Installer" EDR bypass used in ransomware attack |
2025-05-05
⋅
Hunt.io
⋅
APT36-Style ClickFix Attack Spoofs Indian Ministry to Target Windows & Linux |
2025-05-05
⋅
Security Chu
⋅
Negotiations with the Akira ransomware group: an ill-advised approach Akira Akira |
2025-05-01
⋅
Fortinet
⋅
FortiGuard Incident Response Team Detects Intrusion into Middle East Critical National Infrastructure Havoc |
2025-05-01
⋅
Zscaler
⋅
I StealC You: Tracking the Rapid Changes To StealC Stealc |
2025-04-30
⋅
Seqrite
⋅
Advisory: Pahalgam Attack themed decoys used by APT36 to target the Indian Government Crimson RAT |
2025-04-30
⋅
Google Cloud Community
⋅
Finding Malware: Unveiling LUMMAC.V2 with Google Security Operations Lumma Stealer |
2025-04-30
⋅
Malwarebytes
⋅
Fake Social Security Statement emails trick users into installing remote tool Molatori |
2025-04-29
⋅
Nextron Systems
⋅
Nitrogen Dropping Cobalt Strike – A Combination of “Chemical Elements” Cobalt Strike Nitrogen Loader |
2025-04-29
⋅
⋅
France Diplomatie
⋅
Russia – Assignment of cyber attacks against France to the Russian military intelligence service (APT28) (29 April 2025) |
2025-04-29
⋅
LinkedIn (Ethical Hackers Academy)
⋅
RansomHub Ransomware Deploys Malware to Breach Corporate Networks FAKEUPDATES RansomHub |
2025-04-28
⋅
Censys
⋅
Scouting a Threat Actor |
2025-04-28
⋅
SentinelOne
⋅
Top Tier Target | What It Takes to Defend a Cybersecurity Company from Today’s Adversaries PurpleHaze |
2025-04-28
⋅
Infoblox
⋅
Uncovering Actor TTP Patterns and the Role of DNS in Investment Scams Reckless Rabbit Ruthless Rabbit |
2025-04-28
⋅
Netresec
⋅
Decoding njRAT traffic with NetworkMiner NjRAT |