Click here to download all references as Bib-File.•
2024-08-02
⋅
Volexity
⋅
StormBamboo Compromises ISP to Abuse Insecure Software Update Mechanisms CDDS DUSTPAN MgBot |
2024-06-13
⋅
Volexity
⋅
DISGOMOJI Malware Used to Target Indian Government |
2024-04-12
⋅
Volexity
⋅
Zero-Day Exploitation of Unauthenticated Remote Code Execution Vulnerability in GlobalProtect (CVE-2024-3400) UPSTYLE UTA0218 |
2024-02-13
⋅
Volexity
⋅
CharmingCypress: Innovating Persistence BASICSTAR Charming Kitten |
2024-01-10
⋅
Volexity
⋅
Active Exploitation of Two Zero-Day Vulnerabilities in Ivanti Connect Secure VPN UTA0178 |
2023-06-28
⋅
Volexity
⋅
Charming Kitten Updates POWERSTAR with an InterPlanetary Twist POWERSTAR |
2023-03-30
⋅
Volexity
⋅
3CX Supply Chain Compromise Leads to ICONIC Incident 3CX Backdoor IconicStealer |
2023-03-07
⋅
Volexity
⋅
Using Memory Analysis to Detect EDR-Nullifying Malware |
2022-06-15
⋅
Volexity
⋅
DriftingCloud: Zero-Day Sophos Firewall Exploitation and an Insidious Breach pupy Sliver DriftingCloud |
2022-03-22
⋅
Volexity
⋅
Storm Cloud on the Horizon: GIMMICK Malware Strikes at macOS GIMMICK GIMMICK |
2022-02-03
⋅
Volexity
⋅
Operation EmailThief: Active Exploitation of Zero-day XSS Vulnerability in Zimbra TEMP_Heretic |
2021-12-07
⋅
Volexity
⋅
XE Group – Exposed: 8 Years of Hacking & Card Skimming for Profit |
2021-08-24
⋅
Volexity
⋅
North Korean BLUELIGHT Special: InkySquid Deploys RokRAT RokRAT |
2021-05-27
⋅
Volexity
⋅
Suspected APT29 Operation Launches Election Fraud Themed Phishing Campaigns Cobalt Strike |
2021-03-02
⋅
Volexity
⋅
Operation Exchange Marauder: Active Exploitation of Multiple Zero-Day Microsoft Exchange Vulnerabilities CHINACHOPPER HAFNIUM |
2020-12-14
⋅
Volexity
⋅
Dark Halo Leverages SolarWinds Compromise to Breach Organizations SUNBURST |
2020-11-06
⋅
Volexity
⋅
OceanLotus: Extending Cyber Espionage Operations Through Fake Websites Cobalt Strike KerrDown APT32 |
2020-04-21
⋅
Volexity
⋅
Evil Eye Threat Actor Resurfaces with iOS Exploit and Updated Implant |
2020-03-31
⋅
Volexity
⋅
Storm Cloud Unleashed: Tibetan Focus of Highly Targeted Fake Flash Campaign SpyNote Stitch Godlike12 Storm Cloud |
2019-09-11
⋅
Volexity
⋅
Vulnerable Private Networks: Corporate VPNs Exploited in the Wild |
2019-09-02
⋅
Volexity
⋅
Digital Crackdown: Large-Scale Surveillance and Exploitation of Uyghurs scanbox POISON CARP |
2018-06-07
⋅
Volexity
⋅
Patchwork APT Group Targets US Think Tanks Quasar RAT Unidentified 047 QUILTED TIGER |
2017-07-24
⋅
Volexity
⋅
Real News, Fake Flash: Mac OS X Users Targeted Leverage |
2016-11-09
⋅
Volexity
⋅
PowerDuke: Widespread Post-Election Spear Phishing Campaigns Targeting Think Tanks and NGOs PowerDuke |