Click here to download all references as Bib-File.•
| 2025-11-26
⋅
Intrinsec
⋅
Trouble in the air: A spree of campaigns targeting the aerospace industry in Russia DarkWatchman CloudEyE Formbook PhantomCore Remcos |
| 2025-11-26
⋅
CERT-FR
⋅
Mobile phones: Threat landscape since 2015 |
| 2025-11-25
⋅
DeXpose
⋅
Inside Valkyrie Stealer: Capabilities, Evasion Techniques, and Operator Profile Valkyrie Stealer |
| 2025-11-25
⋅
Universita Pegaso
⋅
Dissecting a new malspam chain delivering Purelogs infostealer PureLogs Stealer |
| 2025-11-25
⋅
Arctic Wolf
⋅
Russian RomCom Utilizing SocGholish to Deliver Mythic Agent to U.S. Companies Supporting Ukraine FAKEUPDATES |
| 2025-11-25
⋅
⋅
kienmanowar Blog
⋅
[Quick Analysis] Phishing Campaign Fake Tax Authorities to Distribute Malicious Codes VIP Keylogger |
| 2025-11-24
⋅
⋅
ISH Tecnologia
⋅
Analysis of the WhatsWorm Campaign leading to the implementation of the Eternity Stealer. |
| 2025-11-22
⋅
Synaptic Security
⋅
Inside Gamaredon 2025: Zero-Click Espionage at Scale PteroGraphin Pteranodon |
| 2025-11-22
⋅
LinkedIn (Idan Tarab)
⋅
India‑Aligned "Dropping Elephant" Pushes a New Stealth Marshalled‑Python Backdoor via MSBuild Dropper in Observed Activity Targeting Pakistan’s Defense Sector |
| 2025-11-21
⋅
K7 Security
⋅
Brazilian Campaign: Spreading the Malware via WhatsApp |
| 2025-11-20
⋅
Validin
⋅
Inside DPRK’s Fake Job Platform Targeting U.S. AI Talent |
| 2025-11-20
⋅
Google
⋅
Beyond the Watering Hole: APT24's Pivot to Multi-Vector Attacks BADAUDIO Cobalt Strike |
| 2025-11-20
⋅
Orange Cyberdefense
⋅
A Pain in the Mist: Navigating Operation DreamJob’s arsenal BURNBOOK MISTPEN |
| 2025-11-20
⋅
ThreatFabric
⋅
Sturnus: Mobile Banking Malware bypassing WhatsApp, Telegram and Signal Encryption Sturnus |
| 2025-11-19
⋅
NetAskari Substack
⋅
Critical strike: China's hacking training grounds (PART 1) |
| 2025-11-19
⋅
Natto Thoughts
⋅
China’s Cybersecurity Companies Advancing Offensive Cyber Capabilities Through Attack-Defense Labs |
| 2025-11-19
⋅
Amazon
⋅
New Amazon Threat Intelligence findings: Nation-state actors bridging cyber and kinetic warfare |
| 2025-11-19
⋅
Spamhaus
⋅
The anatomy of bulletproof hosting – past, present, future |
| 2025-11-19
⋅
SecurityScorecard
⋅
Thousands of ASUS Routers Hijacked in Global Operation “WrtHug” in a Suspected China-Backed Campaign |
| 2025-11-19
⋅
ESET Research
⋅
PlushDaemon compromises network devices for adversary-in-the-middle attacks EdgeStepper LittleDaemon |