Click here to download all references as Bib-File.•
2025-05-07
⋅
Google
⋅
COLDRIVER Using New Malware To Steal Documents From Western Targets and NGOs LOSTKEYS |
2025-05-07
⋅
Europol
⋅
DDoS-for-hire empire brought down: Poland arrests 4 administrators, US seizes 9 domains |
2025-05-07
⋅
US Department of Justice
⋅
Case 4:25-cr-00160-JDR: Indictment of Alexey Viktorovich Chertkov, Kirill Vladimirovich Morozov, Aleksandr Aleksandrovich Shishkin and Dmitriy Rubtsov TheMoon |
2025-05-07
⋅
FBI
⋅
Cyber Criminal Services Target End-of-Life Routers to Launch Attacks and Hide Their Activities TheMoon |
2025-05-07
⋅
FBI
⋅
Alert Number: I-050725-PSA Cyber Criminal Proxy Services Exploiting End of Life Routers TheMoon |
2025-05-07
⋅
Palo Alto Networks Unit 42
⋅
Iranian Cyber Actors Impersonate Model Agency in Suspected Espionage Operation APT35 |
2025-05-07
⋅
NTT Security
⋅
Additional Features of OtterCookie Malware Used by WaterPlum BeaverTail OtterCookie InvisibleFerret |
2025-05-06
⋅
Akamai
⋅
Here Comes Mirai: IoT Devices RSVP to Active Exploitation LZRD |
2025-05-06
⋅
Infoblox
⋅
Telegram Tango: Dancing with a Scammer |
2025-05-06
⋅
SentinelOne
⋅
Protection Against Local Upgrade Technique Described in Aon Research |
2025-05-06
⋅
NCSC Switzerland
⋅
Cybersecurity: Situation in Switzerland and internationally - Semi-Annual Report 2024/II |
2025-05-06
⋅
Mandiant
⋅
Defending Against UNC3944: Cybercrime Hardening Guidance from the Frontlines BlackCat DragonForce RansomHub |
2025-05-06
⋅
Mandiant
⋅
Defending Against UNC3944: Cybercrime Hardening Guidance from the Frontlines BlackCat DragonForce RansomHub |
2025-05-06
⋅
urlscan.io
⋅
Rise of Oriental Gudgeon |
2025-05-05
⋅
BleepingComputer
⋅
New "Bring Your Own Installer" EDR bypass used in ransomware attack |
2025-05-05
⋅
Hunt.io
⋅
APT36-Style ClickFix Attack Spoofs Indian Ministry to Target Windows & Linux |
2025-05-05
⋅
Security Chu
⋅
Negotiations with the Akira ransomware group: an ill-advised approach Akira Akira |
2025-05-02
⋅
Arctic Wolf
⋅
Venom Spider Uses Server-Side Polymorphism to Weave a Web Around Victims More_eggs |
2025-05-02
⋅
Kroll
⋅
Prelude: Crypto Heist Causes HAVOC Havoc |
2025-05-01
⋅
Fortinet
⋅
FortiGuard Incident Response Team Detects Intrusion into Middle East Critical National Infrastructure Havoc |