Click here to download all references as Bib-File.•
| 2025-06-10
⋅
Check Point Research
⋅
CVE-2025-33053, Stealth Falcon and Horus: A Saga of Middle Eastern Cyber Espionage Horus |
| 2025-06-10
⋅
MalwareBazaar | SHA256 73fd51d4a0959e5c5a82db9be0d765069d02a2b97f51f55f5d6422a7bec01caa (AmateraStealer) Amatera |
| 2025-06-09
⋅
The Record
⋅
New hacker group uses LockBit ransomware variant to target Russian companies LockBit DarkGaboon |
| 2025-06-09
⋅
Sentinel LABS
⋅
Follow the Smoke | China-nexus Threat Actors Hammer At the Doors of Top Tier Targets GOREshell Nimbo-C2 ShadowPad |
| 2025-06-09
⋅
Netresec
⋅
Detecting PureLogs traffic with CapLoader PureLogs Stealer |
| 2025-06-09
⋅
Zscaler
⋅
DanaBleed: DanaBot C2 Server Memory Leak Bug DanaBot |
| 2025-06-09
⋅
Kaspersky
⋅
Sleep with one eye open: how Librarian Ghouls steal data by night |
| 2025-06-09
⋅
Genians
⋅
Analysis of the Triple Combo Threat of the Kimsuky Group FlowerPower Appleseed BabyShark |
| 2025-06-06
⋅
Aikido
⋅
RATatouille: A Malicious Recipe Hidden in rand-user-agent (Supply Chain Compromise) JADESNOW |
| 2025-06-06
⋅
Seqrite
⋅
Operation DRAGONCLONE: Chinese Telecommunication industry targeted via VELETRIX & VShell malware. VELETRIX VShell |
| 2025-06-05
⋅
Mandiant
⋅
Hello, Operator? A Technical Analysis of Vishing Threats UNC6040 |
| 2025-06-05
⋅
⋅
CERT.AZ
⋅
Information about Threat Group 2 (TG2) |
| 2025-06-05
⋅
Reliaquest
⋅
Scattered Spider Targets Tech Companies for Help-Desk Exploitation |
| 2025-06-05
⋅
ESET Research
⋅
BladedFeline: Whispering in the dark Hawking RDAT Spereal Veaty BladedFeline |
| 2025-06-05
⋅
Hunt.io
⋅
Abusing Paste.ee to Deploy XWorm and AsyncRAT Across Global C2 Infrastructure AsyncRAT XWorm |
| 2025-06-05
⋅
FBI
⋅
Alert Number: I-060525-PSA - Home Internet Connected Devices Facilitate Criminal Activity BADBOX |
| 2025-06-05
⋅
Cisco Talos
⋅
Newly identified wiper malware “PathWiper” targets critical infrastructure in Ukraine PathWiper |
| 2025-06-05
⋅
Mobile-Hacker
⋅
Analysis of Spyware That Helped to Compromise a Syrian Army from Within SpyMax |
| 2025-06-04
⋅
Google
⋅
The Cost of a Call: From Voice Phishing to Data Extortion UNC6040 |
| 2025-06-04
⋅
Threatray
⋅
The Bitter End: Unraveling Eight Years of Espionage Antics – Part Two AlmondRAT AlmondRAT Artra Downloader BDarkRAT Havoc KiwiStealer KugelBlitz MiyaRAT ORPCBackdoor WmRAT ZxxZ |