Click here to download all references as Bib-File.•
2025-02-21
⋅
SonicWall
⋅
Remcos RAT Targets Europe: New AMSI and ETW Evasion Tactics Uncovered Remcos |
2025-02-20
⋅
RedHotCyber
⋅
Linkc Ransomware: The New Cybercriminal Group Targeting Artificial Intelligence Data LinkC Pub |
2025-02-20
⋅
Hunt.io
⋅
LightSpy Expands Command List to Include Social Media Platforms lightSpy |
2025-02-20
⋅
Trend Micro
⋅
Updated Shadowpad Malware Leads to Ransomware Deployment EvilExtractor PlugX ShadowPad Teleboyi |
2025-02-20
⋅
Cisco Talos
⋅
Weathering the storm: In the midst of a Typhoon |
2025-02-20
⋅
Reliaquest
⋅
48 Minutes: How Fast Phishing Attacks Exploit Weaknesses ReedBed |
2025-02-20
⋅
Trend Micro
⋅
Updated Shadowpad Malware Leads to Ransomware Deployment EvilExtractor NailaoLocker PlugX ShadowPad |
2025-02-20
⋅
Cyber Security News
⋅
APT-C-28 Group Launched New Cyber Attack With Fileless RokRat Malware RokRAT |
2025-02-20
⋅
Silent Push
⋅
Tweet on Tracking ValleyRAT Domains with ICP Licenses ValleyRAT |
2025-02-20
⋅
Infrawatch
⋅
GhostSocks - Lumma's Partner In Proxy GhostSocks Lumma Stealer |
2025-02-19
⋅
Natto Thoughts
⋅
The Pangu Team—iOS Jailbreak and Vulnerability Research Giant: A Member of i-SOON’s Exploit-Sharing Network |
2025-02-18
⋅
K7 Security
⋅
Exposing the Deceit: Phishing Sites Impersonating Government Entities |
2025-02-18
⋅
inversecos
⋅
An inside look at NSA (Equation Group) TTPs from China’s lense SECONDDATE |
2025-02-18
⋅
Proofpoint
⋅
An Update on Fake Updates: Two New Actors, and New Mac Malware Marcher FAKEUPDATES FrigidStealer Lumma Stealer |
2025-02-15
⋅
⋅
Youtube (greenplan)
⋅
[BINARY REFINERY] (Emmenhtal) - Deobfuscation of a custom obfuscation algorithm Emmenhtal |
2025-02-13
⋅
Securonix
⋅
Analyzing DEEP#DRIVE: North Korean Threat Actors Observed Exploiting Trusted Platforms for Targeted Attacks RandomQuery |
2025-02-13
⋅
Intel 471
⋅
Threat hunting case study: SocGholish FAKEUPDATES |
2025-02-13
⋅
Symantec
⋅
China-linked Espionage Tools Used in Ransomware Attacks PlugX |
2025-02-13
⋅
Recorded Future
⋅
Inside the Scam: North Korea’s IT Worker Threat BeaverTail OtterCookie InvisibleFerret |
2025-02-13
⋅
Microsoft
⋅
Storm-2372 conducts device code phishing campaign Storm-2372 |