Click here to download all references as Bib-File.•
| 2025-07-20
⋅
Invoke RE
⋅
Scavenger Malware Distributed via eslint-config-prettier NPM Package Supply Chain Compromise Scavenger |
| 2025-07-18
⋅
cocomelonc
⋅
MacOS hacking part 6: Assebmly intro on ARM(M1). Simple NASM (M1) examples |
| 2025-07-18
⋅
Kyiv Independent
⋅
Ukrainian hackers wipe databases at Russia's Gazprom in major cyberattack, intelligence source says |
| 2025-07-18
⋅
The Record
⋅
UK sanctions Russian cyber spies accused of facilitating murders WhisperGate |
| 2025-07-17
⋅
⋅
Cert-UA
⋅
UAC-0001 cyberattacks on the security and defense sector using the LAMEHUG software using LLM (large language model) (CERT-UA#16039) LAMEHUG |
| 2025-07-16
⋅
Seqrite
⋅
UNG0002: Regional Threat Operations Tracked Across Multiple Asian Jurisdictions Shadow RAT |
| 2025-07-16
⋅
Proofpoint
⋅
Phish and Chips: China-Aligned Espionage Actors Ramp Up Taiwan Semiconductor Industry Targeting Cobalt Strike Voldemort UNK_DropPitch UNK_FistBump UNK_SparkyCarp |
| 2025-07-14
⋅
Socket
⋅
Contagious Interview Campaign Escalates With 67 Malicious npm Packages and New Malware Loader BeaverTail InvisibleFerret |
| 2025-07-10
⋅
IBM X-Force
⋅
Hive0145 back in German inboxes with Strela Stealer and a backdoor StarFish |
| 2025-07-08
⋅
cocomelonc
⋅
MacOS hacking part 5: shellcode running. Simple NASM and C (Intel) examples |
| 2025-07-08
⋅
Acronis
⋅
SafePay ransomware: the fast rising threat targeting MSPs SafePay |
| 2025-07-08
⋅
Trellix
⋅
From Click to Compromise: Unveiling the Sophisticated Attack of DoNot APT Group on Southern European Government Entities |
| 2025-07-07
⋅
CyberSecurityNews
⋅
NightEagle APT Attacking Industrial Systems by Exploiting 0-Days and With Adaptive Malware NightEagle |
| 2025-07-06
⋅
MalwareTrace
⋅
XWorm Part 2 - From Downloader to Config Extraction XWorm |
| 2025-07-04
⋅
The Hacker News
⋅
NightEagle APT Exploits Microsoft Exchange Flaw to Target China's Military and Tech Sectors NightEagle |
| 2025-07-04
⋅
cocomelonc
⋅
MacOS hacking part 4: rev shells via x86_64 assembly. Simple NASM and C (Intel, ARM) examples |
| 2025-07-04
⋅
Qianxin
⋅
Exclusive disclosure of the attack activities of the APT group “NightEagle” |
| 2025-07-03
⋅
MalwareTrace
⋅
XWorm Part 1 - Unraveling a Steganography-Based Downloader XWorm |
| 2025-07-02
⋅
CrowdStrike
⋅
CrowdStrike Services Observes SCATTERED SPIDER Escalate Attacks Across Industries |
| 2025-07-02
⋅
K7 Security
⋅
@mentalpositive’s New macOS Stealer: AMOS Repackaged or a New Cyber Threat? AMOS |