Click here to download all references as Bib-File.•
| 2025-07-02
⋅
CrowdStrike
⋅
CrowdStrike Services Observes SCATTERED SPIDER Escalate Attacks Across Industries |
| 2025-07-02
⋅
Netresec
⋅
PureLogs Forensics PureLogs Stealer |
| 2025-07-02
⋅
K7 Security
⋅
@mentalpositive’s New macOS Stealer: AMOS Repackaged or a New Cyber Threat? AMOS |
| 2025-07-01
⋅
ESET Research
⋅
ESET APT Activity Report Q4 2024–Q1 2025: Malware sharing, wipers and exploits UnsolicitedBooker |
| 2025-07-01
⋅
cocomelonc
⋅
Malware development trick 48: leveraging Office macros for malware. Simple VBA example. |
| 2025-07-01
⋅
CERT-IL
⋅
DevMan Ransomware Threat Actor Report DEVMAN |
| 2025-07-01
⋅
ANY.RUN
⋅
DEVMAN Ransomware: Analysis of New DragonForce Variant DEVMAN |
| 2025-07-01
⋅
SpyCloud
⋅
State Secrets for Sale: More Leaks from the Chinese Hack-for-Hire Industry |
| 2025-07-01
⋅
Medium walmartglobaltech
⋅
Janela RAT and a stealer extension delivered together JanelaRAT |
| 2025-07-01
⋅
ANSSI
⋅
Houken: Seeking a Path by Living on The Edge With Zero-Days GOREVERSE |
| 2025-07-01
⋅
ANSSI
⋅
Houken seeking a path by living on the edge with zero-days GOREshell |
| 2025-06-30
⋅
Proofpoint
⋅
10 Things I Hate About Attribution: RomCom vs. TransferLoader MeltingClaw RustyClaw ShadyHammock SlipScreen TransferLoader TA829 |
| 2025-06-30
⋅
Microsoft
⋅
Jasper Sleet: North Korean remote IT workers’ evolving tactics to infiltrate organizations |
| 2025-06-30
⋅
ICC
⋅
ICC detects and contains new sophisticated cyber security incident |
| 2025-06-29
⋅
Medium Sapir Twig
⋅
Inside DarkGate: In-Depth Technical Analysis of the Malware-as-a-Service Threat DarkGate |
| 2025-06-29
⋅
Humpty's RE Blog
⋅
Supper is served Supper |
| 2025-06-27
⋅
WithSecure
⋅
WEEVILPROXY WEEVILPROXY |
| 2025-06-27
⋅
axios
⋅
Prolific cybercriminal group now targeting aviation, transportation companies |
| 2025-06-27
⋅
TEHTRIS
⋅
Rage Against the Powershell - Qilin in the Name Qilin |
| 2025-06-26
⋅
Cyfirma
⋅
Odyssey Stealer: The Rebrand of Poseidon Stealer Odyssey Stealer |