Click here to download all references as Bib-File.•
2025-05-09
⋅
Lumen
⋅
Classic Rock: Hunting a Botnet that preys on the Old |
2025-05-08
⋅
DataBreaches.net
⋅
Negotiations with the Akira ransomware group: an ill-advised approach Akira |
2025-05-08
⋅
Fortinet
⋅
Multilayered Email Attack: How a PDF Invoice and Geo-Fencing Led to RAT Malware Ratty |
2025-05-08
⋅
Forescout
⋅
Threat Analysis: SAP Vulnerability Exploited in the Wild by Chinese Threat Actor Chaya_004 |
2025-05-07
⋅
FBI
⋅
Cyber Criminal Services Target End-of-Life Routers to Launch Attacks and Hide Their Activities TheMoon |
2025-05-07
⋅
Palo Alto Networks Unit 42
⋅
Iranian Cyber Actors Impersonate Model Agency in Suspected Espionage Operation APT35 |
2025-05-06
⋅
Akamai
⋅
Here Comes Mirai: IoT Devices RSVP to Active Exploitation LZRD |
2025-05-05
⋅
BleepingComputer
⋅
New "Bring Your Own Installer" EDR bypass used in ransomware attack |
2025-05-05
⋅
Hunt.io
⋅
APT36-Style ClickFix Attack Spoofs Indian Ministry to Target Windows & Linux |
2025-05-05
⋅
Security Chu
⋅
Negotiations with the Akira ransomware group: an ill-advised approach Akira Akira |
2025-05-01
⋅
Kroll
⋅
FANCY BEAR GONEPOSTAL – Espionage Tool Provides Backdoor Access to Microsoft Outlook GONEPOSTAL |
2025-05-01
⋅
Zscaler
⋅
I StealC You: Tracking the Rapid Changes To StealC Stealc |
2025-04-30
⋅
Seqrite
⋅
Advisory: Pahalgam Attack themed decoys used by APT36 to target the Indian Government Crimson RAT |
2025-04-30
⋅
Google Cloud Community
⋅
Finding Malware: Unveiling LUMMAC.V2 with Google Security Operations Lumma Stealer |
2025-04-29
⋅
Nextron Systems
⋅
Nitrogen Dropping Cobalt Strike – A Combination of “Chemical Elements” Cobalt Strike Nitrogen Loader |
2025-04-29
⋅
⋅
France Diplomatie
⋅
Russia – Assignment of cyber attacks against France to the Russian military intelligence service (APT28) (29 April 2025) |
2025-04-29
⋅
Trustwave
⋅
Yet Another NodeJS Backdoor (YaNB): A Modern Challenge KongTuke |
2025-04-29
⋅
LinkedIn (Ethical Hackers Academy)
⋅
RansomHub Ransomware Deploys Malware to Breach Corporate Networks FAKEUPDATES RansomHub |
2025-04-28
⋅
Censys
⋅
Scouting a Threat Actor |
2025-04-28
⋅
Infoblox
⋅
Uncovering Actor TTP Patterns and the Role of DNS in Investment Scams Reckless Rabbit Ruthless Rabbit |