Click here to download all references as Bib-File.•
| 2025-09-22
⋅
Medium Mr.AnyThink
⋅
Hunting For TamperedChef Infostealer TamperedChef |
| 2025-09-22
⋅
EclecticIQ
⋅
ShinyHunters Calling: Financially Motivated Data Extortion Group Targeting Enterprise Cloud Applications |
| 2025-09-20
⋅
cocomelonc
⋅
Malware development: persistence - part 29. Add Windows Terminal profile. Simple C example. |
| 2025-09-19
⋅
BlackPoint
⋅
KeyZero: A Custom PowerShell RAT |
| 2025-09-19
⋅
ESET Research
⋅
Gamaredon X Turla collab PteroGraphin |
| 2025-09-19
⋅
zensec
⋅
Unmasking Akira: The ransomware tactics you can’t afford to ignore Akira Akira |
| 2025-09-18
⋅
Silent Push
⋅
CountLoader: Silent Push Discovers New Malware Loader Being Served in 3 Different Versions CountLoader |
| 2025-09-18
⋅
Hunt.io
⋅
Tracking AsyncRAT via Trojanized ScreenConnect and Open Directories AsyncRAT |
| 2025-09-18
⋅
Lumen
⋅
SystemBC – Bringing the Noise SystemBC SystemBC |
| 2025-09-17
⋅
Bitdefender
⋅
EggStreme Malware: Unpacking a New APT Framework Targeting a Philippine Military Company |
| 2025-09-17
⋅
Morado
⋅
GLOBAL Ransomware - New Tactics Revealed Global |
| 2025-09-17
⋅
GitLab
⋅
Tech Note - BeaverTail variant distributed via malicious repositories and ClickFix lure BeaverTail OtterCookie BeaverTail InvisibleFerret Beavertail GolangGhost |
| 2025-09-16
⋅
Wiz.io
⋅
Shai-Hulud: Ongoing Package Supply Chain Worm Delivering Data-Stealing Malware Shai-Hulud |
| 2025-09-16
⋅
Proofpoint
⋅
Going Underground: China-aligned TA415 Conducts U.S.-China Economic Relations Targeting Using VS Code Remote Tunnels |
| 2025-09-16
⋅
Infoblox
⋅
Deniability by Design: DNS-Driven Insights into a Malicious Ad Network |
| 2025-09-16
⋅
Sekoia
⋅
APT28 Operation Phantom Net Voxel BEARDSHELL GRUNT SLIMAGENT |
| 2025-09-16
⋅
Reverse The Malware
⋅
Analyze a Malicious Prompt Generator. |
| 2025-09-15
⋅
DeXpose
⋅
Threat Actor Profile: APT27 |
| 2025-09-15
⋅
Qianxin
⋅
The Most Powerful Ever? Inside the 11.5Tbps-Scale Mega Botnet AISURU Aisuru |
| 2025-09-15
⋅
Huntress Labs
⋅
Huntress Threat Advisory: The Dangers of Storing Unencrypted Passwords Akira |