Click here to download all references as Bib-File.•
2025-07-08
⋅
Koi Security
⋅
Google and Microsoft Trusted Them. 2.3 Million Users Installed Them. They Were Malware. |
2025-07-08
⋅
Trellix
⋅
From Click to Compromise: Unveiling the Sophisticated Attack of DoNot APT Group on Southern European Government Entities |
2025-07-08
⋅
United States District Court (Southern District of New York)
⋅
Badbox Takedown Court Order BADBOX |
2025-07-07
⋅
Github (VenzoV)
⋅
Golang garbled executable from Amatera config Amatera |
2025-07-04
⋅
Qianxin
⋅
Exclusive disclosure of the attack activities of the APT group “NightEagle” |
2025-07-03
⋅
Rapid7
⋅
Scattered Spider: Rapid7 Insights, Observations, and Recommendations MimiKatz POORTRY |
2025-07-02
⋅
CrowdStrike
⋅
CrowdStrike Services Observes SCATTERED SPIDER Escalate Attacks Across Industries |
2025-07-02
⋅
Netresec
⋅
PureLogs Forensics PureLogs Stealer |
2025-07-02
⋅
K7 Security
⋅
@mentalpositive’s New macOS Stealer: AMOS Repackaged or a New Cyber Threat? AMOS |
2025-07-01
⋅
SpyCloud
⋅
State Secrets for Sale: More Leaks from the Chinese Hack-for-Hire Industry |
2025-07-01
⋅
Medium walmartglobaltech
⋅
Janela RAT and a stealer extension delivered together JanelaRAT |
2025-07-01
⋅
ANSSI
⋅
Houken: Seeking a Path by Living on The Edge With Zero-Days GOREVERSE |
2025-07-01
⋅
ANSSI
⋅
Houken seeking a path by living on the edge with zero-days GOREshell |
2025-06-30
⋅
Microsoft
⋅
Jasper Sleet: North Korean remote IT workers’ evolving tactics to infiltrate organizations |
2025-06-30
⋅
ICC
⋅
ICC detects and contains new sophisticated cyber security incident |
2025-06-29
⋅
Medium Sapir Twig
⋅
Inside DarkGate: In-Depth Technical Analysis of the Malware-as-a-Service Threat DarkGate |
2025-06-29
⋅
Humpty's RE Blog
⋅
Supper is served Supper |
2025-06-27
⋅
axios
⋅
Prolific cybercriminal group now targeting aviation, transportation companies |
2025-06-27
⋅
TEHTRIS
⋅
Rage Against the Powershell - Qilin in the Name Qilin |
2025-06-26
⋅
Arctic Wolf
⋅
GIFTEDCROOK’s Strategic Pivot: From Browser Stealer to Data Exfiltration Platform During Critical Ukraine Negotiations GIFTEDCROOK |