Click here to download all references as Bib-File.•
2024-10-16
⋅
CISA
⋅
Iranian Cyber Actors’ Brute Force and Credential Access Activity Compromises Critical Infrastructure Organizations |
2024-10-15
⋅
Trend Micro
⋅
Silent Threat: Red Team Tool EDRSilencer Disrupting Endpoint Security Solutions EDRSilencer |
2024-10-15
⋅
⋅
Weixin
⋅
Analysis of the attack activities of APT-C-35 (belly brain worm) against a manufacturing company in South Asia Unidentified 117 (Donot Loader) |
2024-10-14
⋅
Trend Micro
⋅
Water Makara Uses Obfuscated JavaScript in Spear Phishing Campaign, Targets Brazil With Astaroth Malware Astaroth Water Makara |
2024-10-14
⋅
cyble
⋅
Hidden in Plain Sight: ErrorFather’s Deadly Deployment of Cerberus ErrorFather |
2024-10-13
⋅
Elastic
⋅
Declawing PUMAKIT PUMAKIT |
2024-10-13
⋅
Doubleagent.net
⋅
FASTCash for Linux FastCash |
2024-10-12
⋅
Qianxin
⋅
Bitter Group Launches New Trojan Miyarat, Domestic Users Become Primary Ttargets MiyaRAT |
2024-10-11
⋅
Nextron Systems
⋅
In-Depth Analysis of Lynx Ransomware Lynx |
2024-10-11
⋅
Trend Micro
⋅
Earth Simnavaz (aka APT34) Levies Advanced Cyberattacks Against Middle East STEALHOOK OilRig |
2024-10-11
⋅
zimperium
⋅
Expanding the Investigation: Deep Dive into Latest TrickMo Samples TrickMo |
2024-10-11
⋅
Trend Micro
⋅
Earth Simnavaz (aka APT34) Levies Advanced Cyberattacks Against UAE and Gulf Regions STEALHOOK |
2024-10-10
⋅
paloalto Netoworks: Unit42
⋅
Lynx Ransomware: A Rebranding of INC Ransomware INC Lynx |
2024-10-10
⋅
NCSC UK
⋅
Russian foreign intelligence poses global threat with cyber campaign exploiting established vulnerabilities |
2024-10-10
⋅
US Department of Defense
⋅
Update on SVR Cyber Operations and Vulnerability Exploitation |
2024-10-10
⋅
NCSC Switzerland
⋅
Brief technical analysis of the "Gorilla" botnet Gorilla Gorilla |
2024-10-10
⋅
Zscaler
⋅
Technical Analysis of DarkVision RAT DarkVision RAT |
2024-10-10
⋅
Security Boulevard
⋅
Internet Archive is Attacked and 31 Million Files Stolen Blackmeta |
2024-10-10
⋅
SOCRadar
⋅
Internet Archive Data Breach and DDoS Attacks: What You Need to Know Blackmeta |
2024-10-10
⋅
DomainTools
⋅
Uncovering Domains Created by Octo2’s Domain Generation Algorithm Coper |