Click here to download all references as Bib-File.•
2024-11-22
⋅
Volexity
⋅
The Nearest Neighbor Attack: How A Russian APT Weaponized Nearby Wi-Fi Networks for Covert Access |
2024-11-10
⋅
DFIR.ch
⋅
Reptile's Custom Kernel-Module Launcher reptile |
2024-10-17
⋅
Sekoia
⋅
ClickFix tactic: The Phantom Meet Rhadamanthys Stealc |
2024-10-08
⋅
Trustwave
⋅
Pronsis Loader: A JPHP-Driven Malware Diverging from D3F@ck Loader Pronsis Loader Latrodectus Lumma Stealer |
2024-09-12
⋅
Cado Security
⋅
From Automation to Exploitation: The Growing Misuse of Selenium Grid for Cryptomining and Proxyjacking perfctl |
2024-08-30
⋅
Denwp Research
⋅
Anatomy of a Lumma Stealer Attack via Fake CAPTCHA Pages - Part 1 Lumma Stealer |
2024-08-29
⋅
Proofpoint
⋅
The Malware That Must Not Be Named: Suspected Espionage Campaign Delivers “Voldemort” Voldemort |
2024-08-21
⋅
OODA Loop
⋅
Toyota Customer, Employee Data Leaked in Confirmed Data Breach ZeroSevenGroup |
2024-08-20
⋅
SiliconAngle
⋅
Toyota alleges stolen customer data published on hacking site came from outside supplier ZeroSevenGroup |
2024-07-26
⋅
Trellix
⋅
Handala’s Wiper Targets Israel Handala Hatef Handala |
2024-07-16
⋅
JPCERT/CC
⋅
MirrorFace Attack against Japanese Organisations LODEINFO NOOPDOOR |
2024-07-15
⋅
Sekoia
⋅
MuddyWater replaces Atera by custom MuddyRot implant in a recent campaign bugsleep |
2024-06-28
⋅
Trend Micro
⋅
Examining Water Sigbin's Infection Routine Leading to an XMRig Cryptominer Water Sigbin |
2024-06-25
⋅
Cado Security
⋅
From Dormant to Dangerous: P2Pinfect Evolves to Deploy New Ransomware and Cryptominer P2Pinfect |
2024-06-03
⋅
SpyCloud
⋅
Reversing Atomic macOS Stealer: Binaries, Backdoors & Browser Theft AMOS |
2024-05-30
⋅
Akamai
⋅
RedTail Cryptominer Threat Actors Adopt PAN-OS CVE-2024-3400 Exploit RedTail |
2024-05-07
⋅
⋅
Gatewatcher
⋅
Cybercrime's Anatomy Threats to the Healthcare World |
2024-05-04
⋅
Medium MITRE-Engenuity
⋅
Technical Deep Dive: Understanding the Anatomy of a Cyber Intrusion WIREFIRE |
2024-04-22
⋅
Microsoft
⋅
Analyzing Forest Blizzard’s custom post-compromise tool for exploiting CVE-2022-38028 to obtain credentials GooseEgg |
2024-04-10
⋅
Proofpoint
⋅
Security Brief: TA547 Targets German Organizations with Rhadamanthys Stealer Rhadamanthys |