Inside the Kimsuky Leak: How the “Kim” Dump Exposed North Korea’s Credential Theft Playbook - DomainTools Investigations | DTI
https://dti.domaintools.com/inside-the-kimsuky-leak-how-the-kim-dump-exposed-north-koreas-credential-theft-playbook/
iCloud Calendar abused to send phishing emails from Apple’s servers
https://www.bleepingcomputer.com/news/security/icloud-calendar-abused-to-send-phishing-emails-from-apples-servers/
An unexpected journey into Microsoft Defender's signature World — retooling_
https://retooling.io/blog/an-unexpected-journey-into-microsoft-defenders-signature-world
VirusTotal finds hidden malware phishing campaign in SVG files
https://www.bleepingcomputer.com/news/security/virustotal-finds-hidden-malware-phishing-campaign-in-svg-files/
REMOTE WINDOWS CREDENTIAL DUMP WITH SHADOW SNAPSHOTS: EXPLOITATION AND DETECTION – Labs at ITRES
https://labs.itresit.es/2025/06/11/remote-windows-credential-dump-with-shadow-snapshots-exploitation-and-detection/
Hunting postMessage Vulnerabilities – Part 1 | Ryuku | Web Security & Bug Bounty
https://blog.ryukudz.com/posts/postmessage-part-1