Click here to download all references as Bib-File.•
2025-10-14
⋅
Gatewatcher
⋅
Data Breach: the operations of "Charming Kitten" revealed |
2025-10-13
⋅
Proofpoint
⋅
When the monster bytes: tracking TA585 and its arsenal MonsterV2 |
2025-10-10
⋅
Socket
⋅
North Korea’s Contagious Interview Campaign Escalates: 338 Malicious npm Packages, 50,000 Downloads BeaverTail InvisibleFerret |
2025-10-07
⋅
Cybernews
⋅
Steam, Riot Games hit by disruptions: massive DDoS attack suspected Aisuru |
2025-10-06
⋅
BlackPoint
⋅
Malicious Node Package Deploys OtterCookie OtterCookie |
2025-10-03
⋅
Techzine
⋅
What we know so far about Red Hat’s GitLab instance breach Crimson Collective |
2025-10-02
⋅
Trellix
⋅
XWorm V6: Exploring Pivotal Plugins XWorm |
2025-10-02
⋅
Security Affairs
⋅
Cybercrime group claims to have breached Red Hat ‘s private GitHub repositories Crimson Collective |
2025-10-02
⋅
CyberSecurityNews
⋅
Red Hat Data Breach – Threat Actors Claim Breach of 28K Private GitHub Repositories Crimson Collective |
2025-09-30
⋅
Bloomberg
⋅
China Hackers Breached Foreign Ministers' Emails, Palo Alto Says |
2025-09-30
⋅
Google
⋅
Cybercrime Observations from the Frontlines: UNC6040 Proactive Hardening Recommendations |
2025-09-30
⋅
Synthient
⋅
GhostSocks: From Initial Access to Residential Proxy GhostSocks Lumma Stealer |
2025-09-26
⋅
BlackPoint
⋅
Malicious Teams Installers Drop Oyster Malware Broomstick |
2025-09-25
⋅
Koi Security
⋅
First Malicious MCP in the Wild: The Postmark Backdoor That's Stealing Your Emails |
2025-09-24
⋅
Google
⋅
Another BRICKSTORM: Stealthy Backdoor Enabling Espionage into Tech and Legal Sectors BRICKSTORM |
2025-09-24
⋅
The Hacker News
⋅
Chinese Hackers RedNovember Target Global Governments Using Pantegana and Cobalt Strike Cobalt Strike Leslieloader Pantegana SparkRAT Storm-2077 |
2025-09-23
⋅
Bleeping Computer
⋅
Cloudflare mitigates new record-breaking 22.2 Tbps DDoS attack Aisuru |
2025-09-23
⋅
Zscaler
⋅
YiBackdoor: A New Malware Family With Links to IcedID and Latrodectus YiBackdoor |
2025-09-19
⋅
BlackPoint
⋅
KeyZero: A Custom PowerShell RAT |
2025-09-19
⋅
zensec
⋅
Unmasking Akira: The ransomware tactics you can’t afford to ignore Akira Akira |