Click here to download all references as Bib-File.•
2024-11-26
⋅
Security Affairs
⋅
The source code of Banshee Stealer leaked online BANSHEE |
2024-11-25
⋅
LinkedIn (Idan Tarab)
⋅
The IT Army of Ukraine: Cyber Resistance in the Digital Battlefield |
2024-11-22
⋅
Microsoft
⋅
Microsoft shares latest intelligence on North Korean and Chinese threat actors at CYBERWARCON Storm-2077 |
2024-11-22
⋅
Wired
⋅
Russian Spies Jumped From One Network to Another Via Wi-Fi in an Unprecedented Hack |
2024-11-22
⋅
Volexity
⋅
The Nearest Neighbor Attack: How A Russian APT Weaponized Nearby Wi-Fi Networks for Covert Access APT28 |
2024-11-21
⋅
Hunt.io
⋅
DarkPeony’s Trail: Certificate Patterns Point to Sustained Campaign Infrastructure DOPLUGS |
2024-11-21
⋅
Recorded Future
⋅
Russia-Aligned TAG-110 Targets Asia and Europe with HATVIBE and CHERRYSPY HATVIBE |
2024-11-21
⋅
ESET Research
⋅
Unveiling WolfsBane: Gelsemium’s Linux counterpart to Gelsevirine FireWood WolfsBane Icesword |
2024-11-21
⋅
Intrinsec
⋅
PROSPERO & Proton66: Uncovering the links between bulletproof networks Coper SpyNote FAKEUPDATES GootLoader EugenLoader |
2024-11-20
⋅
Cofense
⋅
Custom I2P RAT “I2Parcae” Delivered via Pornographic Customer Support Form Spam I2PRAT Unidentified 118 |
2024-11-20
⋅
Orange Cyberdefense
⋅
The hidden network: How China unites state, corporate, and academic assets for cyber offensive campaigns |
2024-11-20
⋅
Trellix
⋅
Phobos: Stealthy Ransomware That Operated Under the Radar - Until Now 8Base CryptXXXX Dharma Phobos |
2024-11-20
⋅
Intrinsec
⋅
PROSPERO & Proton66: Tracing Uncovering the links between bulletproof networks Coper SpyNote FAKEUPDATES GootLoader EugenLoader IcedID Matanbuchus Nokoyawa Ransomware Pikabot |
2024-11-19
⋅
Zscaler
⋅
Unraveling Raspberry Robin's Layers: Analyzing Obfuscation Techniques and Core Mechanisms Raspberry Robin Roshtyak |
2024-11-19
⋅
Trend Micro
⋅
Spot the Difference: Earth Kasha's New LODEINFO Campaign And The Correlation Analysis With The APT10 Umbrella Cobalt Strike LODEINFO NOOPDOOR MirrorFace |
2024-11-19
⋅
Palo Alto Networks Unit 42
⋅
FrostyGoop’s Zoom-In: A Closer Look into the Malware Artifacts, Behaviors and Network Communications FrostyGoop |
2024-11-19
⋅
CrowdStrike
⋅
Unveiling LIMINAL PANDA: A Closer Look at China's Cyber Threats to the Telecom Sector LIMINAL PANDA |
2024-11-19
⋅
Lumen
⋅
One Sock Fits All: The Use And Abuse Of The NSOCKS Botnet Ngioweb Ngioweb |
2024-11-18
⋅
Kroll
⋅
CARBANAK (aka ANUNAK) Distributed via IDATLOADER (aka HIJACKLOADER) Carbanak HijackLoader |
2024-11-18
⋅
Blackberry
⋅
Suspected Nation-State Adversary Targets Pakistan Navy in Cyber Espionage Campaign Sync-Scheduler |