Click here to download all references as Bib-File.•
2025-04-30
⋅
Google Cloud Community
⋅
Finding Malware: Unveiling LUMMAC.V2 with Google Security Operations Lumma Stealer |
2025-04-30
⋅
Malwarebytes
⋅
Fake Social Security Statement emails trick users into installing remote tool Molatori |
2025-04-29
⋅
Nextron Systems
⋅
Nitrogen Dropping Cobalt Strike – A Combination of “Chemical Elements” Cobalt Strike Nitrogen Loader |
2025-04-29
⋅
⋅
France Diplomatie
⋅
Russia – Assignment of cyber attacks against France to the Russian military intelligence service (APT28) (29 April 2025) |
2025-04-29
⋅
LinkedIn (Ethical Hackers Academy)
⋅
RansomHub Ransomware Deploys Malware to Breach Corporate Networks FAKEUPDATES RansomHub |
2025-04-28
⋅
Censys
⋅
Scouting a Threat Actor |
2025-04-28
⋅
SentinelOne
⋅
Top Tier Target | What It Takes to Defend a Cybersecurity Company from Today’s Adversaries PurpleHaze |
2025-04-28
⋅
Infoblox
⋅
Uncovering Actor TTP Patterns and the Role of DNS in Investment Scams Reckless Rabbit Ruthless Rabbit |
2025-04-28
⋅
Netresec
⋅
Decoding njRAT traffic with NetworkMiner NjRAT |
2025-04-25
⋅
HiSolutions
⋅
Rolling in the Deep(Web): Lazarus Tsunami tsunami |
2025-04-25
⋅
Censys
⋅
The Persistent Threat of Salt Typhoon: Tracking Exposures of Potentially Targeted Devices MASOL |
2025-04-25
⋅
Twitter (@teamcymru_S2)
⋅
Tweet on North Korean Cyber Ops Leveraging Russian Infrastructure |
2025-04-24
⋅
0xreverse
⋅
Understanding Alcatraz ~ Obfuscator Analysis [EN] |
2025-04-24
⋅
Silent Push
⋅
Contagious Interview (DPRK) Launches a New Campaign Creating Three Front Companies to Deliver a Trio of Malware: BeaverTail, InvisibleFerret, and OtterCookie BeaverTail OtterCookie FrostyFerret GolangGhost InvisibleFerret GolangGhost |
2025-04-23
⋅
Microsoft
⋅
Understanding the threat landscape for Kubernetes and containerized assets Storm-1977 |
2025-04-23
⋅
Trend Micro
⋅
Russian Infrastructure Plays Crucial Role in North Korean Cybercrime Operations BeaverTail FrostyFerret GolangGhost InvisibleFerret GolangGhost WageMole |
2025-04-23
⋅
Medium b.magnezi
⋅
AsyncRAT Malware Analysis AsyncRAT |
2025-04-22
⋅
SentinelOne
⋅
What Is Fog Ransomware? Fog |
2025-04-22
⋅
Kaspersky Labs
⋅
Russian organizations targeted by backdoor masquerading as secure networking software updates |
2025-04-22
⋅
Volexity
⋅
Phishing for Codes: Russian Threat Actors Target Microsoft 365 OAuth Workflows UTA0352 UTA0355 |