Click here to download all references as Bib-File.•
| 2025-07-08
⋅
cocomelonc
⋅
MacOS hacking part 5: shellcode running. Simple NASM and C (Intel) examples |
| 2025-07-08
⋅
Acronis
⋅
SafePay ransomware: the fast rising threat targeting MSPs SafePay |
| 2025-07-08
⋅
Trellix
⋅
From Click to Compromise: Unveiling the Sophisticated Attack of DoNot APT Group on Southern European Government Entities |
| 2025-07-07
⋅
CyberSecurityNews
⋅
NightEagle APT Attacking Industrial Systems by Exploiting 0-Days and With Adaptive Malware NightEagle |
| 2025-07-06
⋅
MalwareTrace
⋅
XWorm Part 2 - From Downloader to Config Extraction XWorm |
| 2025-07-04
⋅
The Hacker News
⋅
NightEagle APT Exploits Microsoft Exchange Flaw to Target China's Military and Tech Sectors NightEagle |
| 2025-07-04
⋅
cocomelonc
⋅
MacOS hacking part 4: rev shells via x86_64 assembly. Simple NASM and C (Intel, ARM) examples |
| 2025-07-04
⋅
Qianxin
⋅
Exclusive disclosure of the attack activities of the APT group “NightEagle” |
| 2025-07-03
⋅
MalwareTrace
⋅
XWorm Part 1 - Unraveling a Steganography-Based Downloader XWorm |
| 2025-07-02
⋅
CrowdStrike
⋅
CrowdStrike Services Observes SCATTERED SPIDER Escalate Attacks Across Industries |
| 2025-07-02
⋅
K7 Security
⋅
@mentalpositive’s New macOS Stealer: AMOS Repackaged or a New Cyber Threat? AMOS |
| 2025-07-01
⋅
cocomelonc
⋅
Malware development trick 48: leveraging Office macros for malware. Simple VBA example. |
| 2025-07-01
⋅
CERT-IL
⋅
DevMan Ransomware Threat Actor Report DEVMAN |
| 2025-07-01
⋅
SpyCloud
⋅
State Secrets for Sale: More Leaks from the Chinese Hack-for-Hire Industry |
| 2025-06-30
⋅
Microsoft
⋅
Jasper Sleet: North Korean remote IT workers’ evolving tactics to infiltrate organizations |
| 2025-06-25
⋅
cocomelonc
⋅
MacOS hacking part 3: shellcoding. x86_64 assembly intro. Simple NASM examples |
| 2025-06-24
⋅
Socket
⋅
Another Wave: North Korean Contagious Interview Campaign Drops 35 New Malicious npm Packages BeaverTail InvisibleFerret |
| 2025-06-23
⋅
Gdata
⋅
ConnectUnwise: Threat actors abuse ConnectWise as builder for signed malware EvilConwi |
| 2025-06-23
⋅
cocomelonc
⋅
Linux hacking part 6: Linux kernel module with params. Simple C example |
| 2025-06-21
⋅
⋅
Cert-UA
⋅
Cyberattacks UAC-0001 (APT28) in relation to public authorities using BEARDSHELL and COVENANT BEARDSHELL GRUNT SLIMAGENT |