Click here to download all references as Bib-File.

Enter keywords to filter the library entries below or Propose new Entry
2024-11-06YouTube ( Hexacon)Clement Lecigne, Google Threat Analysis Group
Caught in the wild - Past, present and future
2024-10-31MicrosoftMicrosoft Threat Intelligence
Chinese threat actor Storm-0940 uses credentials from password spray attacks from a covert network
2024-10-29MicrosoftMicrosoft Threat Intelligence
Midnight Blizzard conducts large-scale spear-phishing campaign using RDP files
2024-10-28GoogleGoogle Threat Analysis Group
Hybrid Russian Espionage and Influence Campaign Aims to Compromise Ukrainian Military Recruits and Deliver Anti-Mobilization Narratives
CraxsRAT Pronsis Loader PureLogs Stealer
2024-10-24SeqriteSubhajeet Singha
Operation Cobalt Whisper: Threat Actor Targets Multiple Industries Across Hong Kong and Pakistan
Cobalt Strike Operation Cobalt Whisper
2024-10-24DatadogDatadog
Tenacious Pungsan: A DPRK threat actor linked to Contagious Interview
BeaverTail InvisibleFerret
2024-10-23Cisco TalosEdmund Brumaghin, Holger Unterbrink, Jordyn Dunk, Nicole Hoffman
Threat Spotlight: WarmCookie/BadSpace
Cobalt Strike csharp-streamer RAT WarmCookie
2024-10-22Cisco TalosChetan Raghuprasad
Threat actor abuses Gophish to deliver new PowerRAT and DCRAT
PowerRAT
2024-10-22Twitter (@threatinsight)Threat Insight
Twitter Thread attributing Voldemort to TA415 (APT41, BrassTyphoon)
Voldemort
2024-10-17Microsoft SecurityMicrosoft Threat Intelligence
New macOS vulnerability, “HM Surf”, could lead to unauthorized data access
2024-10-15Weixin360 Threat Intelligence Center
Analysis of the attack activities of APT-C-35 (belly brain worm) against a manufacturing company in South Asia
Unidentified 117 (Donot Loader)
2024-10-09Recorded FutureInsikt Group
Outmaneuvering Rhysida: How Advanced Threat Intelligence Shields Critical Infrastructure from Ransomware
Broomstick Rhysida
2024-10-09Palo AltoUnit 42
Contagious Interview: DPRK Threat Actors Lure Tech Industry Job Seekers to Install New Variants of BeaverTail and InvisibleFerret Malware
beavertail Beavertail
2024-10-06GoogleClement Lecigne, Google Threat Analysis Group
Caught in the wild - Past, present and future
2024-09-30X (@GenThreatLabs)Gen Threat Labs
Tweet on FAKEUPDATES pushing WARMCOOKIE backdoor via compromised websites targeting France
FAKEUPDATES WarmCookie
2024-09-26MicrosoftMicrosoft Threat Intelligence
Storm-0501: Ransomware attacks expanding to hybrid cloud environments
Storm-0501
2024-09-18Twitter (@MsftSecIntel)Microsoft
Tweet about threat actor Vanilla Tempest
INC GootLoader Storm-0494
2024-09-06splunkSplunk Threat Research Team
Handala’s Wiper: Threat Analysis and Detections
Handala Hatef Handala
2024-09-05FortinetCara Lin, Vincent Li
Threat Actors Exploit GeoServer Vulnerability CVE-2024-36401
SideWalk
2024-08-30MicrosoftMicrosoft Threat Intelligence
North Korean threat actor Citrine Sleet exploiting Chromium zero-day
FudModule