Click here to download all references as Bib-File.•
2025-06-17
⋅
Trend Micro
⋅
Critical Langflow Vulnerability (CVE-2025-3248) Actively Exploited to Deliver Flodrix Botnet Flodrix |
2025-06-05
⋅
Reliaquest
⋅
Scattered Spider Targets Tech Companies for Help-Desk Exploitation |
2025-05-27
⋅
Microsoft
⋅
New Russia-affiliated actor Void Blizzard targets critical sectors for espionage Void Blizzard |
2025-04-17
⋅
Kaspersky Labs
⋅
IronHusky updates the forgotten MysterySnail RAT to target Russia and Mongolia MysterySnail |
2025-04-12
⋅
CyberSecurity88
⋅
Algeria’s Ministry of Pharmaceutical Industry Data Leaked in Retaliatory Cyberattack MORH4x |
2025-04-11
⋅
Reliaquest
⋅
Threat Spotlight: Hijacked and Hidden: New Backdoor and Persistence Technique |
2025-04-02
⋅
BushidoToken
⋅
Tracking Adversaries: EvilCorp, the RansomHub affiliate RansomHub |
2025-03-28
⋅
Trend Micro
⋅
A Deep Dive into Water Gamayun’s Arsenal and Infrastructure DarkWisp SilentPrism Kematian Stealer Rhadamanthys Stealc Water Gamayun |
2025-03-10
⋅
LevelBlue
⋅
Prevent, Detect, Contain: LevelBlue MDR’s Guide Against Black Basta Affiliates’ Attacks Black Basta Black Basta ReedBed |
2025-02-27
⋅
BushidoToken
⋅
BlackBasta Leaks: Lessons from the Ascension Health attack Black Basta |
2025-02-27
⋅
Fortinet
⋅
Winos 4.0 Spreads via Impersonation of Official Email to Target Users in Taiwan ValleyRAT Winos |
2025-02-20
⋅
Reliaquest
⋅
48 Minutes: How Fast Phishing Attacks Exploit Weaknesses ReedBed |
2025-01-23
⋅
Github (PaloAltoNetworks)
⋅
Cluster of Infrastructure likely used by Affiliate of Dark Scorpius (Black Basta) ReedBed |
2025-01-17
⋅
Twitter (@Unit42_Intel)
⋅
Tweet about affiliates of DarkScorpius using Social Engineering via MS Teams UNC4393 |
2025-01-13
⋅
⋅
Cert-AgID
⋅
Analisi di una campagna Lumma Stealer con falso CAPTCHA condotta attraverso domino italiano compromesso Lumma Stealer |
2025-01-09
⋅
Recorded Future
⋅
Chinese State-Sponsored RedDelta Targeted Taiwan, Mongolia, and Southeast Asia with Adapted PlugX Infection Chain PlugX |
2024-12-29
⋅
cocomelonc
⋅
Malware and cryptography 38 - Encrypt/decrypt payload via Camellia cipher. S-box analyses examples. Simple C example. |
2024-12-02
⋅
FortiGuard Labs
⋅
SmokeLoader Attack Targets Companies in Taiwan SmokeLoader |
2024-11-20
⋅
SPUR
⋅
The Threat of Residential Proxies to Sanctions Compliance |
2024-11-19
⋅
Australian Signals Directorate
⋅
Annual Cyber Threat Report 2023-2024 |