Click here to download all references as Bib-File.•
2025-04-14
⋅
Palo Alto Networks Unit 42
⋅
Slow Pisces Targets Developers With Coding Challenges and Introduces New Customized Python Malware RN Stealer |
2025-04-14
⋅
Trend Micro
⋅
BPFDoor’s Hidden Controller Used Against Asia, Middle East Targets BPFDoor Red Menshen |
2025-04-12
⋅
CyberSecurity88
⋅
Algeria’s Ministry of Pharmaceutical Industry Data Leaked in Retaliatory Cyberattack MORH4x |
2025-04-11
⋅
Bitso Quetzal Team
⋅
Interview with the Chollima BeaverTail OtterCookie InvisibleFerret |
2025-04-11
⋅
Reliaquest
⋅
Threat Spotlight: Hijacked and Hidden: New Backdoor and Persistence Technique |
2025-04-10
⋅
Kaspersky Labs
⋅
GOFFEE continues to attack organizations in Russia Owowa GOFFEE |
2025-04-10
⋅
Symantec
⋅
Shuckworm Targets Foreign Military Mission Based in Ukraine |
2025-04-10
⋅
Medium TRAC Labs
⋅
Autopsy of a Failed Stealer: StealC v2 Stealc |
2025-04-09
⋅
iVerify
⋅
Abusing Data in the Middle |
2025-04-09
⋅
Resecurity
⋅
Cybercriminals Attacked National Social Security Fund of Morocco - Millions of Digital Identities at Risk of Data Breach Jabaroot |
2025-04-09
⋅
NCSC UK
⋅
Advisory: BADBAZAAR and MOONSHINE: Technical analysis and mitigations badbazaar |
2025-04-09
⋅
NCSC UK
⋅
Advisory: BADBAZAAR and MOONSHINE: Spyware targeting Uyghur, Taiwanese and Tibetan groups and civil society actors badbazaar |
2025-04-09
⋅
NCSC UK
⋅
NCSC and partners share guidance for communities at high risk of digital surveillance badbazaar |
2025-04-09
⋅
Europol
⋅
Operation Endgame follow-up leads to five detentions and interrogations as well as server takedowns SmokeLoader |
2025-04-08
⋅
Team Cymru
⋅
Inside DanaBot’s Infrastructure: In Support of Operation Endgame II DanaBot |
2025-04-08
⋅
Microsoft
⋅
Exploitation of CLFS zero-day leads to ransomware activity RansomEXX Storm-2460 |
2025-04-08
⋅
Trustwave
⋅
A deep Dive into the Leaked Black Basta Chat Logs Black Basta Black Basta |
2025-04-08
⋅
Seqrite
⋅
Goodbye HTA, Hello MSI: New TTPs and Clusters of an APT driven by Multi-Platform Attacks CurlBack RAT XenoRAT |
2025-04-08
⋅
Hunt.io
⋅
State-Sponsored Tactics: How Gamaredon and ShadowPad Operate and Rotate Their Infrastructure ShadowPad |
2025-04-07
⋅
SOC Prime
⋅
UAC-0226 Attack Detection: New Cyber-Espionage Campaign Targeting Ukrainian Innovation Hubs and Government Entities with GIFTEDCROOK Stealer GIFTEDCROOK UAC-0226 |