Click here to download all references as Bib-File.•
| 2025-09-25
⋅
Trend Micro
⋅
New LockBit 5.0 Targets Windows, Linux, ESXi LockBit LockBit |
| 2025-09-24
⋅
Google
⋅
Another BRICKSTORM: Stealthy Backdoor Enabling Espionage into Tech and Legal Sectors BRICKSTORM |
| 2024-10-15
⋅
Trend Micro
⋅
Silent Threat: Red Team Tool EDRSilencer Disrupting Endpoint Security Solutions EDRSilencer |
| 2024-09-26
⋅
The Wall Street Journal
⋅
China-Linked Hackers Breach U.S. Internet Providers in New ‘Salt Typhoon’ Cyberattack GhostEmperor |
| 2024-09-19
⋅
Mandiant
⋅
UNC1860 and the Temple of Oats: Iran’s Hidden Hand in Middle Eastern Networks OATBOAT |
| 2024-09-19
⋅
Mandiant
⋅
UNC1860 and the Temple of Oats: Iran’s Hidden Hand in Middle Eastern Networks CRYPTOSLAY PipeSnoop TEMPLEDOOR UNC1860 |
| 2024-08-20
⋅
Kroll
⋅
FOG Ransomware Targets Higher Education Fog |
| 2024-05-01
⋅
Mandiant
⋅
Uncharmed: Untangling Iran's APT42 Operations TAMECAT |
| 2024-04-21
⋅
Trend Micro
⋅
FOG Ransomware Spread by Cybercriminals Claiming Ties to DOGE Fog |
| 2023-05-26
⋅
Trend Micro
⋅
New Info Stealer Bandit Stealer Targets Browsers, Wallets Bandit Stealer |
| 2023-01-19
⋅
Mandiant
⋅
Suspected Chinese Threat Actors Exploiting FortiOS Vulnerability (CVE-2022-42475) BOLDMOVE BOLDMOVE |
| 2023-01-05
⋅
Mandiant
⋅
Turla: A Galaxy of Opportunity KopiLuwak Andromeda QUIETCANARY |
| 2022-11-29
⋅
Mandiant
⋅
Suspected Russian Activity Targeting Government and Business Entities Around the Globe CEELOADER CryptBot |
| 2022-04-29
⋅
Mandiant
⋅
Trello From the Other Side: Tracking APT29 Phishing Campaigns BEATDROP VaporRage |
| 2022-04-28
⋅
Mandiant
⋅
Trello From the Other Side: Tracking APT29 Phishing Campaigns Cobalt Strike |
| 2021-12-06
⋅
Mandiant
⋅
Suspected Russian Activity Targeting Government and Business Entities Around the Globe (UNC2452) Cobalt Strike CryptBot |
| 2021-05-27
⋅
FireEye
⋅
Re-Checking Your Pulse: Updates on Chinese APT Actors Compromising Pulse Secure VPN Devices UNC2630 UNC2717 |
| 2021-04-20
⋅
FireEye
⋅
Check Your Pulse: Suspected APT Actors Leverage Authentication Bypass Techniques and Pulse Secure Zero-Day |
| 2020-12-13
⋅
FireEye
⋅
Highly Evasive Attacker Leverages SolarWinds Supply Chain to Compromise Multiple Global Victims With SUNBURST Backdoor SUNBURST SUPERNOVA TEARDROP UNC2452 |
| 2020-12-02
⋅
GoSecure
⋅
Deep Dive into an Obfuscation-as-a-Service for Android Malware Geost |