Click here to download all references as Bib-File.•
| 2026-01-28
⋅
Proofpoint
⋅
Can’t stop, won’t stop: TA584 innovates initial access XWorm TA584 |
| 2026-01-16
⋅
sysdig
⋅
VoidLink threat analysis: Sysdig discovers C2-compiled kernel rootkits VoidLink |
| 2025-12-18
⋅
Proofpoint
⋅
Access granted: phishing with device code authorization for account takeover UNK_AcademicFlare |
| 2025-12-16
⋅
sysdig
⋅
EtherRAT dissected: How a React2Shell implant delivers 5 payloads through blockchain C2 EtherRAT |
| 2025-12-08
⋅
sysdig
⋅
EtherRAT: DPRK uses novel Ethereum implant in React2Shell attacks EtherRAT |
| 2025-11-04
⋅
Twitter (@nextronresearch)
⋅
Tweet about BQT ransomware on Linux BQTlock |
| 2025-10-14
⋅
Reliaquest
⋅
SOE-phisticated Persistence: Inside Flax Typhoon's ArcGIS Compromise |
| 2025-10-13
⋅
Proofpoint
⋅
When the monster bytes: tracking TA585 and its arsenal MonsterV2 |
| 2025-09-16
⋅
Proofpoint
⋅
Going Underground: China-aligned TA415 Conducts U.S.-China Economic Relations Targeting Using VS Code Remote Tunnels |
| 2025-09-03
⋅
Proofpoint
⋅
Not Safe for Work: Tracking and Investigating Stealerium and Phantom Infostealers Phantom Stealer |
| 2025-07-16
⋅
Proofpoint
⋅
Phish and Chips: China-Aligned Espionage Actors Ramp Up Taiwan Semiconductor Industry Targeting Cobalt Strike Voldemort UNK_DropPitch UNK_FistBump UNK_SparkyCarp |
| 2025-07-14
⋅
Arda Büyükkaya
⋅
GLOBAL GROUP: Emerging Ransomware-as-a-Service, Supporting AI Driven Negotiation and Mobile Control Panel for Their Affiliates Global |
| 2025-06-30
⋅
Proofpoint
⋅
10 Things I Hate About Attribution: RomCom vs. TransferLoader MeltingClaw RustyClaw ShadyHammock SlipScreen TransferLoader TA829 |
| 2025-06-16
⋅
Proofpoint
⋅
Amatera Stealer: Rebranded ACR Stealer With Improved Evasion, Sophistication ACR Stealer Amatera |
| 2025-06-05
⋅
Reliaquest
⋅
Scattered Spider Targets Tech Companies for Help-Desk Exploitation |
| 2025-04-11
⋅
Reliaquest
⋅
Threat Spotlight: Hijacked and Hidden: New Backdoor and Persistence Technique |
| 2025-03-07
⋅
Proofpoint
⋅
Remote Monitoring and Management (RMM) Tooling Increasingly an Attacker’s First Choice |
| 2025-02-18
⋅
Proofpoint
⋅
An Update on Fake Updates: Two New Actors, and New Mac Malware Marcher FAKEUPDATES FrigidStealer Lumma Stealer |
| 2024-11-18
⋅
Proofpoint
⋅
Security Brief: ClickFix Social Engineering Technique Floods Threat Landscape AsyncRAT Brute Ratel C4 DanaBot DarkGate Latrodectus Lumma Stealer NetSupportManager RAT XWorm |
| 2024-11-14
⋅
EclecticIQ
⋅
Inside Intelligence Center: Financially Motivated Chinese Threat Actor SilkSpecter Targeting Black Friday Shoppers SilkSpecter |