Click here to download all references as Bib-File.•
| 2025-10-18
⋅
Twitter (@ThreatrayLabs)
⋅
Tweet on Kimsuky activity with loaders delivering HttpSpy and HttpTroy NikiTeaR |
| 2025-10-18
⋅
Koi Security
⋅
GlassWorm: First Self-Propagating Worm Using Invisible Code Hits OpenVSX Marketplace GlassWorm |
| 2025-10-18
⋅
Medium 0xzyadelzyat
⋅
PureLogs Stealer: Complete Malware Analysis & CTF Walkthrough PureLogs Stealer |
| 2025-10-16
⋅
Trendmicro
⋅
Shifts in the Underground: The Impact of Water Kurita’s (Lumma Stealer) Doxxing Lumma Stealer |
| 2025-10-16
⋅
Hunt.io
⋅
Odyssey Stealer and AMOS Campaign Targets macOS Developers Through Fake Tools AMOS |
| 2025-10-16
⋅
Swisscom B2B CSIRT
⋅
Swisscom TDR Intel Brief - Acreed: On-Chain C2 Evolution ACR Stealer |
| 2025-10-16
⋅
Mandiant
⋅
DPRK Adopts EtherHiding: Nation-State Malware Hiding on Blockchains JADESNOW |
| 2025-10-16
⋅
Cisco Talos
⋅
BeaverTail and OtterCookie evolve with a new Javascript module BeaverTail OtterCookie InvisibleFerret |
| 2025-10-15
⋅
Symantec
⋅
Jewelbug: Chinese APT Group Widens Reach to Russia |
| 2025-10-15
⋅
David Dodda
⋅
How I Almost Got Hacked By A 'Job Interview' OtterCookie |
| 2025-10-15
⋅
Kaspersky
⋅
Mysterious Elephant: a growing threat Remcos |
| 2025-10-15
⋅
NTT
⋅
OtterCandy, malware used by WaterPlum OtterCandy |
| 2025-10-15
⋅
Trend Micro
⋅
Operation Zero Disco: Attackers Exploit Cisco SNMP Vulnerability to Deploy Rootkits |
| 2025-10-14
⋅
Synacktiv
⋅
LinkPro: eBPF rootkit analysis LinkPro |
| 2025-10-14
⋅
⋅
Synacktiv
⋅
LinkPro: analysis of an eBPF rootkit LinkPro vGet |
| 2025-10-14
⋅
Reliaquest
⋅
SOE-phisticated Persistence: Inside Flax Typhoon's ArcGIS Compromise |
| 2025-10-14
⋅
Gatewatcher
⋅
Data Breach: the operations of "Charming Kitten" revealed |
| 2025-10-13
⋅
⋅
Logpresso
⋅
[Threat Analysis] Lazarus Group Analyzes Malware for Windows and MacOS |
| 2025-10-13
⋅
SpyCloud
⋅
More Than Meets the YY: Analyzing the YYlaiyu PhaaS Panel |
| 2025-10-13
⋅
NCSC UK
⋅
Malware Analysis Report: RayInitiator & LINE VIPER |