Click here to download all references as Bib-File.•
| 2025-10-01
⋅
Checkpoint
⋅
Rhadamanthys 0.9.x – walk through the updates Rhadamanthys |
| 2025-09-30
⋅
Bloomberg
⋅
China Hackers Breached Foreign Ministers' Emails, Palo Alto Says |
| 2025-09-30
⋅
Google
⋅
Cybercrime Observations from the Frontlines: UNC6040 Proactive Hardening Recommendations |
| 2025-09-30
⋅
CIP
⋅
Russian Cyber Operations WRECKSTEEL HOMESTEEL Amatera GIFTEDCROOK StrelaStealer |
| 2025-09-30
⋅
Infoblox
⋅
Detour Dog: DNS Malware Powers Strela Stealer Campaigns StrelaStealer |
| 2025-09-30
⋅
Github (KittenBusters)
⋅
KittenBusters: CharmingKitten BellaCiao |
| 2025-09-30
⋅
K7 Security
⋅
PatchWork APT |
| 2025-09-30
⋅
Palo Alto Networks Unit 42
⋅
Phantom Taurus: A New Chinese Nexus APT and the Discovery of the NET-STAR Malware Suite NET-STAR |
| 2025-09-30
⋅
Elastic
⋅
WARMCOOKIE One Year Later: New Features and Fresh Insights WarmCookie |
| 2025-09-30
⋅
Synthient
⋅
GhostSocks: From Initial Access to Residential Proxy GhostSocks Lumma Stealer |
| 2025-09-29
⋅
The DFIR Report
⋅
From a Single Click: How Lunar Spider Enabled a Near Two-Month Intrusion Brute Ratel C4 Cobalt Strike Latrodectus |
| 2025-09-29
⋅
Shindan
⋅
DHCSpy - Discovering the Iranian APT MuddyWater DHCSpy |
| 2025-09-28
⋅
Malasada Tech
⋅
Oyster Malware Delivery via Teams Fake App Broomstick |
| 2025-09-26
⋅
abuse.ch
⋅
Twitter Post Kamasers |
| 2025-09-26
⋅
Arctic Wolf
⋅
Smash and Grab: Aggressive Akira Campaign Targets SonicWall VPNs, Deploys Ransomware in an Hour or Less Akira Akira |
| 2025-09-26
⋅
BlackPoint
⋅
Malicious Teams Installers Drop Oyster Malware Broomstick |
| 2025-09-25
⋅
Logpoint
⋅
XWorm RAT analysis: Steal, persist & control XWorm |
| 2025-09-25
⋅
Trend Micro
⋅
New LockBit 5.0 Targets Windows, Linux, ESXi LockBit LockBit |
| 2025-09-25
⋅
ESET Research
⋅
DeceptiveDevelopment: From primitive crypto theft to sophisticated AI-based deception BeaverTail OtterCookie InvisibleFerret PylangGhost AkdoorTea GolangGhost Tropidoor TsunamiKit |
| 2025-09-25
⋅
Virus Bulletin
⋅
DeceptiveDevelopment: From primitive crypto theft to sophisticated AI-based deception BeaverTail OtterCookie InvisibleFerret PylangGhost AkdoorTea GolangGhost Tropidoor TsunamiKit |