Click here to download all references as Bib-File.•
2025-04-25
⋅
Trend Micro
⋅
Earth Kurma APT Campaign Targets Southeast Asian Government, Telecom Sectors KRNRAT Moriya Earth Kurma |
2025-04-25
⋅
HiSolutions
⋅
Rolling in the Deep(Web): Lazarus Tsunami tsunami |
2025-04-25
⋅
Censys
⋅
The Persistent Threat of Salt Typhoon: Tracking Exposures of Potentially Targeted Devices MASOL |
2025-04-25
⋅
Twitter (@teamcymru_S2)
⋅
Tweet on North Korean Cyber Ops Leveraging Russian Infrastructure |
2025-04-24
⋅
Mandiant
⋅
M-Trends 2025 Report Akira Black Basta LockBit SystemBC GootLoader LockBit WIREFIRE Akira Black Basta Cobalt Strike LockBit RansomHub SystemBC Pink Sandstorm |
2025-04-24
⋅
Positive Technologies
⋅
Crypters And Tools. Part 2: Different Paws — Same Tangle |
2025-04-24
⋅
0xreverse
⋅
Understanding Alcatraz ~ Obfuscator Analysis [EN] |
2025-04-24
⋅
Silent Push
⋅
Contagious Interview (DPRK) Launches a New Campaign Creating Three Front Companies to Deliver a Trio of Malware: BeaverTail, InvisibleFerret, and OtterCookie BeaverTail OtterCookie FrostyFerret GolangGhost InvisibleFerret GolangGhost |
2025-04-23
⋅
Microsoft
⋅
Understanding the threat landscape for Kubernetes and containerized assets Storm-1977 |
2025-04-23
⋅
Trend Micro
⋅
Russian Infrastructure Plays Crucial Role in North Korean Cybercrime Operations BeaverTail FrostyFerret GolangGhost InvisibleFerret GolangGhost WageMole |
2025-04-23
⋅
Medium b.magnezi
⋅
AsyncRAT Malware Analysis AsyncRAT |
2025-04-22
⋅
Fortinet
⋅
Infostealer Malware FormBook Spread via Phishing Campaign – Part I Formbook |
2025-04-22
⋅
AhnLab
⋅
Distribution of PebbleDash Malware in March 2025 AsyncRAT PEBBLEDASH |
2025-04-22
⋅
SentinelOne
⋅
What Is Fog Ransomware? Fog |
2025-04-22
⋅
Kaspersky Labs
⋅
Russian organizations targeted by backdoor masquerading as secure networking software updates |
2025-04-22
⋅
Volexity
⋅
Phishing for Codes: Russian Threat Actors Target Microsoft 365 OAuth Workflows UTA0352 UTA0355 |
2025-04-21
⋅
Trellix
⋅
Unmasking the Evolving Threat: A Deep Dive into the Latest Version of Lumma InfoStealer with Code Flow Obfuscation Lumma Stealer |
2025-04-21
⋅
Twitter (@browsercookies)
⋅
Tweet on public Google Drive potentially connected to DPRK activity. |
2025-04-17
⋅
Trail of Bits
⋅
Mitigating ELUSIVE COMET Zoom remote control attacks ELUSIVE COMET |
2025-04-17
⋅
Porthas
⋅
Breaking the B0 ransomware: Investigation & Decryption B0 |