09/07

Inside the Kimsuky Leak: How the “Kim” Dump Exposed North Korea’s Credential Theft Playbook - DomainTools Investigations | DTI

https://dti.domaintools.com/inside-the-kimsuky-leak-how-the-kim-dump-exposed-north-koreas-credential-theft-playbook/
Inside the Kimsuky Leak: How the “Kim” Dump Exposed North Korea’s Credential Theft Playbook - DomainTools Investigations | DTI

iCloud Calendar abused to send phishing emails from Apple’s servers

https://www.bleepingcomputer.com/news/security/icloud-calendar-abused-to-send-phishing-emails-from-apples-servers/
iCloud Calendar abused to send phishing emails from Apple’s servers

An unexpected journey into Microsoft Defender's signature World — retooling_

https://retooling.io/blog/an-unexpected-journey-into-microsoft-defenders-signature-world
An unexpected journey into Microsoft Defender's signature World — retooling_

VirusTotal finds hidden malware phishing campaign in SVG files

https://www.bleepingcomputer.com/news/security/virustotal-finds-hidden-malware-phishing-campaign-in-svg-files/
VirusTotal finds hidden malware phishing campaign in SVG files

REMOTE WINDOWS CREDENTIAL DUMP WITH SHADOW SNAPSHOTS: EXPLOITATION AND DETECTION – Labs at ITRES

https://labs.itresit.es/2025/06/11/remote-windows-credential-dump-with-shadow-snapshots-exploitation-and-detection/
REMOTE WINDOWS CREDENTIAL DUMP WITH SHADOW SNAPSHOTS: EXPLOITATION AND DETECTION – Labs at ITRES