Click here to download all references as Bib-File.•
| 2025-12-30
⋅
US Department of Justice
⋅
Two Americans Plead Guilty to Targeting Multiple U.S. Victims Using ALPHV BlackCat Ransomware BlackCat BlackCat |
| 2025-12-09
⋅
CISA
⋅
Pro-Russia Hacktivists Conduct Opportunistic Attacks Against US and Global Critical Infrastructure |
| 2025-12-09
⋅
Department of Justice
⋅
Justice Department Announces Actions to Combat Two Russian State-Sponsored Cyber Criminal Hacking Groups |
| 2025-12-09
⋅
Department of Justice
⋅
Justice Department Announces Actions to Combat Two Russian State-Sponsored Cyber Criminal Hacking Groups |
| 2025-12-04
⋅
CrowdStrike
⋅
Unveiling WARP PANDA: A New Sophisticated China-Nexus Adversary BRICKSTORM WARP PANDA |
| 2025-11-15
⋅
Elastic
⋅
RONINGLOADER: DragonBreath’s New Path to PPL Abuse DragonBreath RONINGLOADER |
| 2025-10-27
⋅
Trend Micro
⋅
Active Water Saci Campaign Spreading Via WhatsApp Features Multi-Vector Persistence and Sophisticated C&C Water Saci |
| 2025-10-21
⋅
Elastic
⋅
TOLLBOOTH: What's yours, IIS mine TOLLBOOTH |
| 2025-10-14
⋅
Reliaquest
⋅
SOE-phisticated Persistence: Inside Flax Typhoon's ArcGIS Compromise |
| 2025-09-30
⋅
Elastic
⋅
WARMCOOKIE One Year Later: New Features and Fresh Insights WarmCookie |
| 2025-09-25
⋅
ESET Research
⋅
DeceptiveDevelopment: From primitive crypto theft to sophisticated AI-based deception BeaverTail OtterCookie InvisibleFerret PylangGhost AkdoorTea GolangGhost Tropidoor TsunamiKit |
| 2025-09-25
⋅
Virus Bulletin
⋅
DeceptiveDevelopment: From primitive crypto theft to sophisticated AI-based deception BeaverTail OtterCookie InvisibleFerret PylangGhost AkdoorTea GolangGhost Tropidoor TsunamiKit |
| 2025-07-29
⋅
⋅
Elastic
⋅
MaaS Appeal: An Infostealer Rises From The Ashes Nova Stealer |
| 2025-07-17
⋅
Medium Ireneusz Tarnowski
⋅
Dissecting the ClickFix User-Execution Attack and Its Sophisticated Persistence via ADS Cobalt Strike |
| 2025-07-08
⋅
Trellix
⋅
From Click to Compromise: Unveiling the Sophisticated Attack of DoNot APT Group on Southern European Government Entities |
| 2025-06-30
⋅
ICC
⋅
ICC detects and contains new sophisticated cyber security incident |
| 2025-06-18
⋅
Elastic
⋅
A Wretch Client: From ClickFix deception to information stealer deployment HijackLoader Lumma Stealer SectopRAT |
| 2025-06-18
⋅
Huntress Labs
⋅
Feeling Blue(Noroff): Inside a Sophisticated DPRK Web3 Intrusion |
| 2025-06-16
⋅
Proofpoint
⋅
Amatera Stealer: Rebranded ACR Stealer With Improved Evasion, Sophistication ACR Stealer Amatera |
| 2025-05-29
⋅
Elastic
⋅
Chasing Eddies: New Rust-based InfoStealer used in CAPTCHA campaigns EDDIESTEALER |