Click here to download all references as Bib-File.•
2025-05-19
⋅
The DFIR Report
⋅
Another Confluence Bites the Dust: Falling to ELPACO-team Ransomware Mimic Ransomware MimiKatz |
2025-05-14
⋅
Zscaler
⋅
Technical Analysis of TransferLoader TransferLoader |
2025-05-02
⋅
Arctic Wolf
⋅
Venom Spider Uses Server-Side Polymorphism to Weave a Web Around Victims More_eggs |
2025-05-01
⋅
Fortinet
⋅
FortiGuard Incident Response Team Detects Intrusion into Middle East Critical National Infrastructure Havoc |
2025-05-01
⋅
Zscaler
⋅
I StealC You: Tracking the Rapid Changes To StealC Stealc |
2025-04-28
⋅
Censys
⋅
Scouting a Threat Actor |
2025-04-25
⋅
Twitter (@teamcymru_S2)
⋅
Tweet on North Korean Cyber Ops Leveraging Russian Infrastructure |
2025-04-16
⋅
IBM X-Force
⋅
IBM X-Force 2025 Threat Intelligence Index |
2025-04-11
⋅
Bitso Quetzal Team
⋅
Interview with the Chollima BeaverTail OtterCookie InvisibleFerret |
2025-04-11
⋅
Reliaquest
⋅
Threat Spotlight: Hijacked and Hidden: New Backdoor and Persistence Technique |
2025-04-10
⋅
Symantec
⋅
Shuckworm Targets Foreign Military Mission Based in Ukraine |
2025-04-03
⋅
ThreatMon
⋅
Ransomhub Group & New Betruger Backdoor Technical Malware Analysis Report |
2025-03-26
⋅
ThreatMon
⋅
Raton / Silly - Remote Access Trojan | Technical Malware Analysis Report AsyncRAT |
2025-03-24
⋅
SYGNIA
⋅
Weaver Ant, the Web Shell Whisperer: Tracking a Live China-nexus Operation CHINACHOPPER reGeorg |
2025-03-19
⋅
Natto Thoughts
⋅
Zhou Shuai: A Hacker’s Road to APT27 |
2025-03-16
⋅
SYGNIA
⋅
Bybit – What We Know So Far |
2025-03-13
⋅
Linkedin (ThreatMon)
⋅
Chrome DLL Manipulation Attack Exposed |
2025-03-11
⋅
ThreatMon
⋅
New Ermac Variant - Android Banking Trojan & Botnet ERMAC |
2025-03-07
⋅
Proofpoint
⋅
Remote Monitoring and Management (RMM) Tooling Increasingly an Attacker’s First Choice |
2025-02-26
⋅
ThreatMon
⋅
FOG Ransomware Attacks the Energy Sector in Turkey Fog |