Click here to download all references as Bib-File.•
2025-02-28
⋅
KrebsOnSecurity
⋅
Notorious Malware, Spam Host “Prospero” Moves to Kaspersky Lab FAKEUPDATES GootLoader |
2025-02-27
⋅
Securite360.net
⋅
How Long Can a Vulnerable Server Stay Clean on the Internet? A Honeypot Tale RedTail |
2025-02-26
⋅
POLITICO
⋅
Chinese hackers siphoned off Belgian state security emails, report says |
2025-02-24
⋅
SecurityScorecard
⋅
Massive Botnet Targets M365 with Stealthy Password Spraying Attacks |
2025-02-24
⋅
K7 Security
⋅
LCRYX Ransomware: How a VB Ransomware Locks Your System LCRYX |
2025-02-20
⋅
Cyber Security News
⋅
APT-C-28 Group Launched New Cyber Attack With Fileless RokRat Malware RokRAT |
2025-02-18
⋅
K7 Security
⋅
Exposing the Deceit: Phishing Sites Impersonating Government Entities |
2025-02-11
⋅
Github (SecurityBlueTeam)
⋅
Smartloader Wireshark plugin SmartLoader |
2025-02-11
⋅
CyberSecurityNews
⋅
Sandworm APT Exploits Trojanized KMS Tools to Target Ukrainian Users in Cyber Espionage Campaign DCRat |
2025-02-06
⋅
Securi
⋅
Google Tag Manager Skimmer Steals Credit Card Info From Magento Site magecart |
2025-01-29
⋅
SecurityScorecard
⋅
Operation Phantom Circuit: North Korea’s Global Data Exfiltration Campaign BeaverTail InvisibleFerret |
2025-01-27
⋅
SecurityScorecard
⋅
Operation Phantom Circuit: North Korea’s Global Data Exfiltration Campaign |
2025-01-21
⋅
Financial Security Institute
⋅
Follow the Clues - Everyday is lazarus.day |
2025-01-17
⋅
Google Cloud Security
⋅
Threat Horizons - H1 2025 Threat Horizons Report FAKEUPDATES Conti Hades LockBit Phoenix Locker RansomHub TRIPLESTRENGTH |
2025-01-15
⋅
⋅
Habr
⋅
F.A.C.C.T. found new attacks of pro-Ukrainian cyber spies Sticky Werewolf Ozone RAT |
2025-01-08
⋅
Acronis
⋅
TMPN (Skuld) Stealer: The dark side of open source Skuld |
2025-01-08
⋅
CISO Series
⋅
Cyber Security News: Cyber Trust label, UK deepfake laws, Treasury attack details Natohub |
2025-01-03
⋅
RATs on the island (Remote Access Trojans in Sri Lanka's Cybersecurity Landscape) AsyncRAT Quasar RAT Remcos |
2024-12-24
⋅
⋅
NTT Security Holdings
⋅
Contagious Interview Uses New Malware Otter Cookie BeaverTail OtterCookie InvisibleFerret |
2024-12-14
⋅
Axel's IT Security Research
⋅
How to Identify XenoRAT C2 Servers XenoRAT |