Click here to download all references as Bib-File.•
2022-09-14
⋅
Trend Micro
⋅
A Post-exploitation Look at Coinminers Abusing WebLogic Vulnerabilities Kinsing |
2022-09-13
⋅
DataBreaches.net
⋅
Singapore corporations making progress in preventing cyberattacks ALTDOS |
2022-09-13
⋅
Symantec
⋅
New Wave of Espionage Activity Targets Asian Governments MimiKatz PlugX Quasar RAT ShadowPad Trochilus RAT |
2022-09-13
⋅
Proofpoint
⋅
Look What You Made Me Do: TA453 Uses Multi-Persona Impersonation to Capitalize on FOMO |
2022-09-13
⋅
Abnormal
⋅
Back to School: BEC Group Targets Teachers with Payroll Diversion Attacks |
2022-09-13
⋅
AdvIntel
⋅
AdvIntel's State of Emotet aka "SpmTools" Displays Over Million Compromised Machines Through 2022 Conti Cobalt Strike Emotet Ryuk TrickBot |
2022-09-13
⋅
Palo Alto Networks Unit 42
⋅
OriginLogger: A Look at Agent Tesla’s Successor Agent Tesla OriginLogger |
2022-09-13
⋅
Sansec Threat Research
⋅
Magento vendor Fishpig hacked, backdoors added Rekoobe |
2022-09-12
⋅
Infosec Writeups
⋅
Raccoon Stealer v2 Malware Analysis Raccoon RecordBreaker |
2022-09-09
⋅
Github (m4now4r)
⋅
“Mustang Panda” – Enemy at the gate PlugX |
2022-09-09
⋅
Elastic
⋅
BUGHATCH Malware Analysis BUGHATCH |
2022-09-08
⋅
Cisco Talos
⋅
Lazarus and the tale of three RATs MagicRAT MimiKatz VSingle YamaBot |
2022-09-08
⋅
Trend Micro
⋅
How Malicious Actors Abuse Native Linux Tools in Attacks |
2022-09-08
⋅
Mandiant
⋅
What to Expect When You’re Electing: Preparing for Cyber Threats to the 2022 U.S. Midterm Elections |
2022-09-08
⋅
Microsoft
⋅
Microsoft investigates Iranian attacks against the Albanian government ZeroCleare |
2022-09-08
⋅
Microsoft
⋅
The art and science behind Microsoft threat hunting: Part 1 |
2022-09-08
⋅
Certfa
⋅
Charming Kitten: "Can We Have A Meeting?" Important puzzle pieces of Charming Kitten's cyber espionage operations |
2022-09-08
⋅
Secureworks
⋅
BRONZE PRESIDENT Targets Government Officials PlugX |
2022-09-08
⋅
Cybereason
⋅
Threat Analysis Report: PlugX RAT Loader Evolution PlugX |
2022-09-08
⋅
Center for European Policy Analysis
⋅
Russian Cyberwarfare: Unpacking the Kremlin’s Capabilities |