Click here to download all references as Bib-File.•
| 2025-07-13
⋅
cocomelonc
⋅
Mobile malware development trick 1. Abuse Telegram Bot API. Simple Android (Java/Kotlin) stealer example. |
| 2025-07-12
⋅
t0ast's blog
⋅
Global Group: Ransomware-as-a-Service with AI-powered Negotiation Global |
| 2025-07-11
⋅
Authentic8
⋅
Cyber Intel Brief: NightEagle APT, AI deepfakes, SPNEGO flaw NightEagle |
| 2025-07-10
⋅
IBM X-Force
⋅
Hive0145 back in German inboxes with Strela Stealer and a backdoor StarFish |
| 2025-07-08
⋅
cocomelonc
⋅
MacOS hacking part 5: shellcode running. Simple NASM and C (Intel) examples |
| 2025-07-08
⋅
Acronis
⋅
SafePay ransomware: the fast rising threat targeting MSPs SafePay |
| 2025-07-08
⋅
Koi Security
⋅
Google and Microsoft Trusted Them. 2.3 Million Users Installed Them. They Were Malware. |
| 2025-07-08
⋅
Trellix
⋅
From Click to Compromise: Unveiling the Sophisticated Attack of DoNot APT Group on Southern European Government Entities |
| 2025-07-08
⋅
United States District Court (Southern District of New York)
⋅
Badbox Takedown Court Order BADBOX |
| 2025-07-07
⋅
Meterpreter
⋅
ANSSI Exposes “Houken”: China-Linked APT Exploiting Ivanti CSA Zero-Days & Deploying Linux Rootkits Houken |
| 2025-07-07
⋅
CyberSecurityNews
⋅
NightEagle APT Attacking Industrial Systems by Exploiting 0-Days and With Adaptive Malware NightEagle |
| 2025-07-07
⋅
Github (VenzoV)
⋅
Golang garbled executable from Amatera config Amatera |
| 2025-07-06
⋅
MalwareTrace
⋅
XWorm Part 2 - From Downloader to Config Extraction XWorm |
| 2025-07-04
⋅
ANSSI
⋅
Houken seeking a path by living on the edge with zero-days Houken |
| 2025-07-04
⋅
The Hacker News
⋅
NightEagle APT Exploits Microsoft Exchange Flaw to Target China's Military and Tech Sectors NightEagle |
| 2025-07-04
⋅
cocomelonc
⋅
MacOS hacking part 4: rev shells via x86_64 assembly. Simple NASM and C (Intel, ARM) examples |
| 2025-07-04
⋅
Qianxin
⋅
Exclusive disclosure of the attack activities of the APT group “NightEagle” |
| 2025-07-03
⋅
MalwareTrace
⋅
XWorm Part 1 - Unraveling a Steganography-Based Downloader XWorm |
| 2025-07-03
⋅
Rapid7
⋅
Scattered Spider: Rapid7 Insights, Observations, and Recommendations MimiKatz POORTRY |
| 2025-07-02
⋅
0x0d4y
⋅
VELETRIX Loader Dissection: Kill Chain Analysis of China-Nexus Telecommunications Infrastructure Targeting VELETRIX |