Click here to download all references as Bib-File.•
| 2025-12-09
⋅
CISA
⋅
Pro-Russia Hacktivists Conduct Opportunistic Attacks Against US and Global Critical Infrastructure |
| 2025-12-09
⋅
Department of Justice
⋅
Justice Department Announces Actions to Combat Two Russian State-Sponsored Cyber Criminal Hacking Groups |
| 2025-12-09
⋅
Environmental Protection Agency
⋅
Foreign National Indicted and Extradited to the United States for Role in Two Russia-Linked Cyber Hacking Groups |
| 2025-12-09
⋅
Department of Justice
⋅
Justice Department Announces Actions to Combat Two Russian State-Sponsored Cyber Criminal Hacking Groups |
| 2025-12-09
⋅
Reverse The Malware
⋅
Debunking a Malware Technique That Bypasses Binwalk Using dd |
| 2025-12-09
⋅
Huntress Labs
⋅
AMOS Stealer Exploits AI Trust: Malware Delivered Through ChatGPT and Grok AMOS |
| 2025-12-08
⋅
Ransom-ISAC
⋅
Cross-Chain TxDataHiding Crypto Heist: A Very (Very) Chainful Process (Part 4) JADESNOW |
| 2025-12-08
⋅
sysdig
⋅
EtherRAT: DPRK uses novel Ethereum implant in React2Shell attacks EtherRAT |
| 2025-12-08
⋅
Trend Micro
⋅
AI-Automated Threat Hunting Brings GhostPenguin Out of the Shadows GhostPenguin |
| 2025-12-08
⋅
Swisscom B2B CSIRT
⋅
Swisscom B2B CSIRT - TDR Intel Brief: Unmasking Amadey 5 Amadey |
| 2025-12-04
⋅
Amazon
⋅
China-nexus cyber threat groups rapidly exploit React2Shell vulnerability (CVE-2025-55182) |
| 2025-12-04
⋅
CrowdStrike
⋅
Unveiling WARP PANDA: A New Sophisticated China-Nexus Adversary BRICKSTORM WARP PANDA |
| 2025-12-03
⋅
Hunt.io
⋅
Malicious VSCode Extension Launches Multi-Stage Attack Chain with Anivia Loader and OctoRAT OctoRAT |
| 2025-12-02
⋅
Trend Micro
⋅
Unraveling Water Saci's New Multi-Format, AI-Enhanced Attacks Propagated via WhatsApp Water Saci |
| 2025-12-02
⋅
⋅
Positive Technologies
⋅
(Ex)Cobalt. A review of the group's tools in attacks for 2024-2025 PUMAKIT |
| 2025-12-02
⋅
Zscaler
⋅
Shai-Hulud V2 Poses Risk To NPM Supply Chain Shai-Hulud |
| 2025-12-01
⋅
LinkedIn (Microsoft)
⋅
Post about Phishing Campaign pushing XWorm XWorm TA584 |
| 2025-11-26
⋅
CERT-FR
⋅
Mobile phones: Threat landscape since 2015 |
| 2025-11-25
⋅
DeXpose
⋅
Inside Valkyrie Stealer: Capabilities, Evasion Techniques, and Operator Profile Valkyrie Stealer |
| 2025-11-24
⋅
⋅
ISH Tecnologia
⋅
Analysis of the WhatsWorm Campaign leading to the implementation of the Eternity Stealer. |