Click here to download all references as Bib-File.•
2025-02-24
⋅
SecurityScorecard
⋅
Massive Botnet Targets M365 with Stealthy Password Spraying Attacks |
2025-02-24
⋅
cocomelonc
⋅
Malware development trick 45: hiding and extracting payload in PNGs (with cats). Simple C example. OceanLotus DuQu StegoLoader |
2025-02-24
⋅
K7 Security
⋅
LCRYX Ransomware: How a VB Ransomware Locks Your System LCRYX |
2025-02-24
⋅
Kaspersky Labs
⋅
The GitVenom campaign: cryptocurrency theft using GitHub AsyncRAT Quasar RAT |
2025-02-23
⋅
The Guardian
⋅
Hackers steal $1.5bn from crypto exchange in ‘biggest digital heist ever’ |
2025-02-22
⋅
CrowdStrike
⋅
Curly Spider UNC4393 |
2025-02-22
⋅
CrowdStrike
⋅
Wandering Spider Black Basta Black Basta GOLD REBELLION |
2025-02-21
⋅
cyjax
⋅
How’s that for a malicious Linkc, new group launches DLS LinkC Pub |
2025-02-21
⋅
Kaspersky Labs
⋅
Angry Likho: Old beasts in a new forest Lumma Stealer Angry Likho |
2025-02-21
⋅
TRM Labs
⋅
TRM Links North Korea to Record $1.5 Billion Record Hack |
2025-02-21
⋅
Twitter (@salmanvsf)
⋅
Tweet about VXPCrypter |
2025-02-20
⋅
RedHotCyber
⋅
Linkc Ransomware: The New Cybercriminal Group Targeting Artificial Intelligence Data LinkC Pub |
2025-02-20
⋅
Group-IB
⋅
Fingerprint Heists: How your browser fingerprint can be stolen and used by fraudsters ScreamedJungle |
2025-02-20
⋅
Reliaquest
⋅
48 Minutes: How Fast Phishing Attacks Exploit Weaknesses ReedBed |
2025-02-20
⋅
Orange Cyberdefense
⋅
Meet NailaoLocker: a ransomware distributed in Europe by ShadowPad and PlugX backdoors NailaoLocker PlugX ShadowPad |
2025-02-20
⋅
Cyber Security News
⋅
APT-C-28 Group Launched New Cyber Attack With Fileless RokRat Malware RokRAT |
2025-02-20
⋅
Silent Push
⋅
Tweet on Tracking ValleyRAT Domains with ICP Licenses ValleyRAT |
2025-02-20
⋅
Infrawatch
⋅
GhostSocks - Lumma's Partner In Proxy GhostSocks Lumma Stealer |
2025-02-19
⋅
Natto Thoughts
⋅
The Pangu Team—iOS Jailbreak and Vulnerability Research Giant: A Member of i-SOON’s Exploit-Sharing Network |
2025-02-19
⋅
0x0d4y
⋅
Technical Analysis of Lockbit4.0 Evasion Tales LockBit |