Click here to download all references as Bib-File.•
2025-03-28
⋅
ThreatFabric
⋅
Exposing Crocodilus: New Device Takeover Malware Targeting Android Devices Crocodilus |
2025-03-28
⋅
SUCURI
⋅
Hidden Malware Strikes Again: Mu-Plugins Under Attack |
2025-03-28
⋅
Intrinsec
⋅
From espionage to PsyOps: Tracking operations and bulletproof providers of UACs in 2025 sLoad NetSupportManager RAT Remcos SmokeLoader |
2025-03-27
⋅
Infoblox
⋅
A Phishing Tale of DoH and DNS MX Abuse |
2025-03-26
⋅
⋅
ISH Tecnologia
⋅
ffdgf Lynx |
2025-03-26
⋅
⋅
Youtube (greenplan)
⋅
[BINARY REFINERY] (StegoCampaign) - Deobfuscation of a VBScript stage (PART 1) |
2025-03-26
⋅
Cisco Talos
⋅
Year in Review |
2025-03-26
⋅
ThreatMon
⋅
Raton / Silly - Remote Access Trojan | Technical Malware Analysis Report AsyncRAT |
2025-03-26
⋅
Zscaler
⋅
CoffeeLoader: A Brew of Stealthy Techniques CoffeeLoader |
2025-03-26
⋅
Twitter (@MalGamy12)
⋅
Tweet about RALord ransomware RALord |
2025-03-25
⋅
⋅
Youtube (greenplan)
⋅
[BINARY REFINERY] (StegoCampaign) - Scrittura di una Unit per ottenere il C2 |
2025-03-25
⋅
IBM X-Force
⋅
IBM X-Force discovers new Sheriff Backdoor used to target Ukraine Deputy Sheriff |
2025-03-25
⋅
JPCERT/CC
⋅
Tempted to Classifying APT Actors: Practical Challenges of Attribution in the Case of Lazarus’s Subgroup |
2025-03-25
⋅
DomainTools
⋅
Phishing Campaign Targets Defense and Aerospace Firms Linked to Ukraine Conflict |
2025-03-25
⋅
Kaspersky Labs
⋅
Operation ForumTroll: APT attack with Google Chrome zero-day exploit chain Operation ForumTroll |
2025-03-25
⋅
SpyCloud
⋅
On the Hunt for Ghost(Socks) GhostSocks |
2025-03-24
⋅
SYGNIA
⋅
Weaver Ant, the Web Shell Whisperer: Tracking a Live China-nexus Operation CHINACHOPPER reGeorg |
2025-03-23
⋅
AviaB
⋅
Analyzing Vidar Stealer Vidar |
2025-03-20
⋅
ESET Research
⋅
Operation FishMedley ShadowPad SodaMaster Spyder |
2025-03-20
⋅
Cisco Talos
⋅
UAT-5918 targets critical infrastructure entities in Taiwan LaZagne JuicyPotato Meterpreter MimiKatz UAT-5918 |