Click here to download all references as Bib-File.•
2025-04-01
⋅
Hunt.io
⋅
Same Russian-Speaking Threat Actor, New Tactics: Abuse of Cloudflare Services for Phishing and Telegram to Filter Victim IPs Pyramid |
2025-03-28
⋅
ThreatFabric
⋅
Exposing Crocodilus: New Device Takeover Malware Targeting Android Devices Crocodilus |
2025-03-27
⋅
Infoblox
⋅
A Phishing Tale of DoH and DNS MX Abuse |
2025-03-26
⋅
eSentire
⋅
The Long and Short(cut) of It: KoiLoader Analysis Koi Loader |
2025-03-26
⋅
ThreatMon
⋅
Raton / Silly - Remote Access Trojan | Technical Malware Analysis Report AsyncRAT |
2025-03-13
⋅
Securonix
⋅
Analyzing OBSCURE#BAT Threat Actors Lure Victims into Executing Malicious Batch Scripts to Deploy Stealthy Rootkits Quasar RAT r77 |
2025-03-13
⋅
Linkedin (ThreatMon)
⋅
Chrome DLL Manipulation Attack Exposed |
2025-03-12
⋅
Red Canary
⋅
2025 Threat Detection Report HijackLoader Lumma Stealer NetSupportManager RAT |
2025-03-11
⋅
Cato Networks
⋅
Cato CTRL Threat Research: Ballista – New IoT Botnet Targeting Thousands of TP-Link Archer Routers Ballista |
2025-03-11
⋅
ThreatMon
⋅
New Ermac Variant - Android Banking Trojan & Botnet ERMAC |
2025-03-07
⋅
Proofpoint
⋅
Remote Monitoring and Management (RMM) Tooling Increasingly an Attacker’s First Choice |
2025-03-06
⋅
Twitter (@MsftSecIntel)
⋅
Tweet about Moonstone Sleet dropping Qilin ransomware Qilin |
2025-03-05
⋅
HUMAN
⋅
Satori Threat Intelligence Disruption: BADBOX 2.0 Targets Consumer Devices with Multiple Fraud Schemes BADBOX |
2025-03-05
⋅
Microsoft
⋅
Silk Typhoon targeting IT supply chain |
2025-02-28
⋅
CrowdStrike
⋅
2025 Global Threat Report GOLD REBELLION UNC4393 |
2025-02-27
⋅
Palo Alto Networks Unit 42
⋅
Squidoor: Suspected Chinese Threat Actor’s Backdoor Targets Global Organizations FINALDRAFT FINALDRAFT REF7707 |
2025-02-26
⋅
ThreatMon
⋅
FOG Ransomware Attacks the Energy Sector in Turkey Fog |
2025-02-24
⋅
EUR-Lex
⋅
Council Implementing Regulation (EU) 2025/389 of 24 February 2025 implementing Regulation (EU) No 269/2014 concerning restrictive measures in respect of actions undermining or threatening the territorial integrity, sovereignty and independence of Ukraine |
2025-02-18
⋅
Proofpoint
⋅
An Update on Fake Updates: Two New Actors, and New Mac Malware Marcher FAKEUPDATES FrigidStealer Lumma Stealer |
2025-02-13
⋅
Zscaler
⋅
Technical Analysis of Xloader Versions 6 and 7 | Part 2 Xloader |