Click here to download all references as Bib-File.•
| 2025-12-10
⋅
The Record
⋅
DOJ, CISA warn of Russia-linked attacks targeting meat processing plants, nuclear regulatory entities and other critical infrastructure |
| 2025-12-10
⋅
Check Point Research
⋅
Cracking ValleyRAT: From Builder Secrets to Kernel Rootkits ValleyRAT |
| 2025-12-10
⋅
Trend Micro
⋅
CVE-2025-55182: React2Shell Analysis, Proof-of-Concept Chaos, and In-the-Wild Exploitation |
| 2025-12-10
⋅
LinkedIn (Idan Tarab)
⋅
Lifting the Shadow: APT-C-35’s Living Web Footprint |
| 2025-12-10
⋅
zimperium
⋅
Total Takeover: DroidLock Hijacks Your Device DroidLock |
| 2025-12-10
⋅
Netresec
⋅
Latrodectus BackConnect IcedID Keyhole Latrodectus |
| 2025-12-09
⋅
CISA
⋅
Pro-Russia Hacktivists Conduct Opportunistic Attacks Against US and Global Critical Infrastructure |
| 2025-12-09
⋅
Department of Justice
⋅
Justice Department Announces Actions to Combat Two Russian State-Sponsored Cyber Criminal Hacking Groups |
| 2025-12-09
⋅
Environmental Protection Agency
⋅
Foreign National Indicted and Extradited to the United States for Role in Two Russia-Linked Cyber Hacking Groups |
| 2025-12-09
⋅
Department of Justice
⋅
Justice Department Announces Actions to Combat Two Russian State-Sponsored Cyber Criminal Hacking Groups |
| 2025-12-09
⋅
Reverse The Malware
⋅
From Pixels to Payloads: Understanding Malicious PNG Files |
| 2025-12-09
⋅
Reverse The Malware
⋅
Debunking a Malware Technique That Bypasses Binwalk Using dd |
| 2025-12-09
⋅
BlackPoint
⋅
Snakes in the Castle: Inside the Walls of Python-Driven CastleLoader Delivery CASTLELOADER |
| 2025-12-09
⋅
Huntress Labs
⋅
AMOS Stealer Exploits AI Trust: Malware Delivered Through ChatGPT and Grok AMOS |
| 2025-12-08
⋅
Ransom-ISAC
⋅
Cross-Chain TxDataHiding Crypto Heist: A Very (Very) Chainful Process (Part 4) JADESNOW |
| 2025-12-08
⋅
sysdig
⋅
EtherRAT: DPRK uses novel Ethereum implant in React2Shell attacks EtherRAT |
| 2025-12-08
⋅
Kroll
⋅
New AMOS Infection Vector Highlights Risks around AI Adoption AMOS |
| 2025-12-08
⋅
Trend Micro
⋅
AI-Automated Threat Hunting Brings GhostPenguin Out of the Shadows GhostPenguin |
| 2025-12-08
⋅
Swisscom B2B CSIRT
⋅
Swisscom B2B CSIRT - TDR Intel Brief: Unmasking Amadey 5 Amadey |
| 2025-12-07
⋅
Reverse The Malware
⋅
From Pixels to Payloads: Understanding Malicious BMP Files |