Click here to download all references as Bib-File.•
2025-04-29
⋅
LinkedIn (Ethical Hackers Academy)
⋅
RansomHub Ransomware Deploys Malware to Breach Corporate Networks FAKEUPDATES RansomHub |
2025-04-28
⋅
Github (Censys Research)
⋅
Public Github Archive of Scout C2 ScoutC2 |
2025-04-28
⋅
Censys
⋅
Scouting a Threat Actor |
2025-04-28
⋅
SentinelOne
⋅
Top Tier Target | What It Takes to Defend a Cybersecurity Company from Today’s Adversaries PurpleHaze |
2025-04-28
⋅
Infoblox
⋅
Uncovering Actor TTP Patterns and the Role of DNS in Investment Scams Reckless Rabbit Ruthless Rabbit |
2025-04-28
⋅
Netresec
⋅
Decoding njRAT traffic with NetworkMiner NjRAT |
2025-04-25
⋅
Trend Micro
⋅
Earth Kurma APT Campaign Targets Southeast Asian Government, Telecom Sectors KRNRAT Moriya Earth Kurma |
2025-04-25
⋅
HiSolutions
⋅
Rolling in the Deep(Web): Lazarus Tsunami tsunami |
2025-04-25
⋅
Censys
⋅
The Persistent Threat of Salt Typhoon: Tracking Exposures of Potentially Targeted Devices MASOL |
2025-04-25
⋅
Twitter (@teamcymru_S2)
⋅
Tweet on North Korean Cyber Ops Leveraging Russian Infrastructure |
2025-04-24
⋅
Mandiant
⋅
M-Trends 2025 Report Akira Black Basta LockBit SystemBC GootLoader LockBit WIREFIRE Akira Black Basta Cobalt Strike LockBit RansomHub SystemBC Pink Sandstorm |
2025-04-24
⋅
Positive Technologies
⋅
Crypters And Tools. Part 2: Different Paws — Same Tangle |
2025-04-24
⋅
0xreverse
⋅
Understanding Alcatraz ~ Obfuscator Analysis [EN] |
2025-04-24
⋅
Silent Push
⋅
Contagious Interview (DPRK) Launches a New Campaign Creating Three Front Companies to Deliver a Trio of Malware: BeaverTail, InvisibleFerret, and OtterCookie BeaverTail OtterCookie FrostyFerret GolangGhost InvisibleFerret GolangGhost |
2025-04-23
⋅
Microsoft
⋅
Understanding the threat landscape for Kubernetes and containerized assets Storm-1977 |
2025-04-23
⋅
Trend Micro
⋅
Russian Infrastructure Plays Crucial Role in North Korean Cybercrime Operations BeaverTail FrostyFerret GolangGhost InvisibleFerret GolangGhost WageMole |
2025-04-23
⋅
Medium b.magnezi
⋅
AsyncRAT Malware Analysis AsyncRAT |
2025-04-22
⋅
Fortinet
⋅
Infostealer Malware FormBook Spread via Phishing Campaign – Part I Formbook |
2025-04-22
⋅
AhnLab
⋅
Distribution of PebbleDash Malware in March 2025 AsyncRAT PEBBLEDASH |
2025-04-22
⋅
SentinelOne
⋅
What Is Fog Ransomware? Fog |