Click here to download all references as Bib-File.•
| 2026-03-20
⋅
IC3
⋅
I-032026-PSA: Russian Intelligence Services Target Commercial Messaging Application Accounts |
| 2026-02-26
⋅
Group-IB
⋅
GTFire Phishing Scheme: Avoiding Detection Using Google Services GTFire |
| 2026-02-01
⋅
Midnight Blue Labs
⋅
Have you tried turning it off and on again? On bricking OT devices (part 2) |
| 2026-02-01
⋅
Midnight Blue Labs
⋅
Have you tried turning it off and on again? On bricking OT devices (part 1) |
| 2025-12-18
⋅
Proofpoint
⋅
Access granted: phishing with device code authorization for account takeover TA2723 UNK_AcademicFlare |
| 2025-12-17
⋅
XLab
⋅
Kimwolf Exposed: The Massive Android Botnet with 1.8 Million Infected Devices Kimwolf Aisuru |
| 2025-12-10
⋅
zimperium
⋅
Total Takeover: DroidLock Hijacks Your Device DroidLock |
| 2025-11-26
⋅
FortiGuard Labs
⋅
ShadowV2 Casts a Shadow Over IoT Devices ShadowV2 |
| 2025-11-19
⋅
ESET Research
⋅
PlushDaemon compromises network devices for adversary-in-the-middle attacks EdgeStepper LittleDaemon |
| 2025-11-13
⋅
NVISO Labs
⋅
Contagious Interview Actors Now Utilize JSON Storage Services for Malware Delivery BeaverTail OtterCookie InvisibleFerret Beavertail TsunamiKit |
| 2025-11-11
⋅
Botcrawl
⋅
National Civil Service Commission of Colombia Data Breach Exposes 2.9 TB of Government Files Kazu |
| 2025-11-10
⋅
Genians
⋅
State-Sponsored Remote Wipe Tactics Targeting Android Devices Quasar RAT Remcos |
| 2025-11-07
⋅
LANDFALL: New Commercial-Grade Android Spyware in Exploit Chain Targeting Samsung Devices LANDFALL |
| 2025-10-14
⋅
CIP
⋅
Adversaries Target Ukrainian Defence Forces and Local Authorities Using "Counter-Sabotage" Lure UAC-0239 |
| 2025-10-08
⋅
⋅
CIP
⋅
New cyber threats: who and how to attack enemy groups WRECKSTEEL HOMESTEEL GIFTEDCROOK UAC-0227 |
| 2025-09-30
⋅
CIP
⋅
Russian Cyber Operations WRECKSTEEL HOMESTEEL Amatera GIFTEDCROOK StrelaStealer |
| 2025-09-02
⋅
At-Bay
⋅
Rhysida: Evading Detection, One Service at a Time Rhysida |
| 2025-08-21
⋅
GBHackers on Security
⋅
Threat Actors Weaponize PDF Editor Trojan to Convert Devices into Proxies TamperedChef |
| 2025-08-18
⋅
Medium RaghavtiResearch
⋅
Qilin Ransomware-as-a-Service: Threat Analysis and Strategic Outlook Qilin AgendaCrypt |
| 2025-08-06
⋅
IBM X-Force
⋅
Dissecting the CastleBot Malware-as-a-Service operation CASTLELOADER NightshadeC2 |