Click here to download all references as Bib-File.•
| 2026-04-07
⋅
IC3
⋅
AA26-097A: Iranian-Affiliated Cyber Actors Exploit Programmable Logic Controllers Across US Critical Infrastructure |
| 2026-03-26
⋅
Darktrace
⋅
Phantom Footprints: Tracking GhostSocks Malware GhostSocks Lumma Stealer |
| 2026-03-16
⋅
Ransom-ISAC
⋅
Contagious Interview: VS Code to RAT StoatWaffle |
| 2025-12-10
⋅
The Record
⋅
DOJ, CISA warn of Russia-linked attacks targeting meat processing plants, nuclear regulatory entities and other critical infrastructure |
| 2025-12-09
⋅
CISA
⋅
Pro-Russia Hacktivists Conduct Opportunistic Attacks Against US and Global Critical Infrastructure |
| 2025-12-08
⋅
Ransom-ISAC
⋅
Cross-Chain TxDataHiding Crypto Heist: A Very (Very) Chainful Process (Part 4) JADESNOW |
| 2025-12-04
⋅
CISA
⋅
Malware Analysis Report (MAR) BRICKSTORM Backdoor BRICKSTORM |
| 2025-11-20
⋅
Kaspersky Labs
⋅
Blockchain and Node.js abused by Tsundere: an emerging botnet Tsundere |
| 2025-11-13
⋅
Ransom-ISAC
⋅
Cross-Chain TxDataHiding Crypto Heist: A Very Chainful Process (Part 3) JADESNOW |
| 2025-10-27
⋅
Ransom-ISAC
⋅
Cross-Chain TxDataHiding Crypto Heist: A Very Chainful Process (Part 2) JADESNOW |
| 2025-10-20
⋅
Ransom-ISAC
⋅
Cross-Chain TxDataHiding Crypto Heist: A Very Chainful Process (Part 1) JADESNOW |
| 2025-09-16
⋅
HUMAN
⋅
Satori Threat Intelligence Alert: SlopAds Covers Fraud with Layers of Obfuscation SlopAds |
| 2025-08-27
⋅
US Department of Defense
⋅
Countering Chinese State-Sponsored Actors Compromise of Networks Worldwide to Feed Global Espionage System |
| 2025-07-31
⋅
Reverse The Malware
⋅
Threat Intelligence visa ccTLD ( country code top-level domain ) |
| 2025-05-01
⋅
Fortinet
⋅
FortiGuard Incident Response Team Detects Intrusion into Middle East Critical National Infrastructure Havoc |
| 2025-03-12
⋅
CISA
⋅
Medusa Ransomware Medusa |
| 2025-03-10
⋅
Cybershafarat
⋅
DieNet and #Shiite_Harvest claimed responsibility for disabling ten significant Iraqi websites DieNet |
| 2025-03-07
⋅
Fortinet
⋅
Investigating Iranian Intrusion into Strategic Middle East Critical Infrastructure Havoc |
| 2025-03-05
⋅
HUMAN
⋅
Satori Threat Intelligence Disruption: BADBOX 2.0 Targets Consumer Devices with Multiple Fraud Schemes BADBOX |
| 2025-02-20
⋅
Group-IB
⋅
Fingerprint Heists: How your browser fingerprint can be stolen and used by fraudsters ScreamedJungle |