Click here to download all references as Bib-File.•
2025-08-08
⋅
AhnLab
⋅
Distribution of SmartLoader Malware via Github Repository Disguised as a Legitimate Project Rhadamanthys SmartLoader |
2025-07-24
⋅
SYGNIA
⋅
Fire Ant: A Deep-Dive into Hypervisor-Level Espionage |
2025-07-24
⋅
Red Canary
⋅
Intelligence Insights: July 2025 Broomstick |
2025-07-23
⋅
Natto Thoughts
⋅
HAFNIUM-Linked Hacker Xu Zewei: Riding the Tides of China’s Cyber Ecosystem |
2025-07-18
⋅
Arctic Wolf
⋅
Greedy Sponge Targets Mexico with AllaKore RAT and SystemBC AllaKore SystemBC |
2025-07-16
⋅
Proofpoint
⋅
Phish and Chips: China-Aligned Espionage Actors Ramp Up Taiwan Semiconductor Industry Targeting Cobalt Strike Voldemort |
2025-07-14
⋅
Arda Büyükkaya
⋅
GLOBAL GROUP: Emerging Ransomware-as-a-Service, Supporting AI Driven Negotiation and Mobile Control Panel for Their Affiliates Global |
2025-07-01
⋅
SpyCloud
⋅
State Secrets for Sale: More Leaks from the Chinese Hack-for-Hire Industry |
2025-06-26
⋅
Arctic Wolf
⋅
GIFTEDCROOK’s Strategic Pivot: From Browser Stealer to Data Exfiltration Platform During Critical Ukraine Negotiations GIFTEDCROOK |
2025-06-23
⋅
PolySwarm Tech Team
⋅
Famous Chollima’s PylangGhost GolangGhost PylangGhost GolangGhost |
2025-06-16
⋅
Proofpoint
⋅
Amatera Stealer: Rebranded ACR Stealer With Improved Evasion, Sophistication ACR Stealer Amatera |
2025-06-16
⋅
SecurityScorecard
⋅
Checking all the Boxes: LapDogs, The New ORB in Town ShortLeash ShortLeash |
2025-06-15
⋅
Positive Technologies
⋅
Team46 and TaxOff: two sides of the same coin Cobalt Strike |
2025-06-12
⋅
Symantec
⋅
Fog Ransomware: Unusual Toolset Used in Recent Attack Fog |
2025-06-09
⋅
Zscaler
⋅
DanaBleed: DanaBot C2 Server Memory Leak Bug DanaBot |
2025-06-05
⋅
Reliaquest
⋅
Scattered Spider Targets Tech Companies for Help-Desk Exploitation |
2025-05-19
⋅
The DFIR Report
⋅
Another Confluence Bites the Dust: Falling to ELPACO-team Ransomware Mimic Ransomware MimiKatz |
2025-05-14
⋅
Zscaler
⋅
Technical Analysis of TransferLoader TransferLoader |
2025-05-02
⋅
Arctic Wolf
⋅
Venom Spider Uses Server-Side Polymorphism to Weave a Web Around Victims More_eggs |
2025-05-01
⋅
Fortinet
⋅
FortiGuard Incident Response Team Detects Intrusion into Middle East Critical National Infrastructure Havoc |