Click here to download all references as Bib-File.

Enter keywords to filter the library entries below or Propose new Entry
2024-10-16CISACISA
Iranian Cyber Actors’ Brute Force and Credential Access Activity Compromises Critical Infrastructure Organizations
2024-10-15Trend MicroCj Arsley Mateo, Jacob Santos, Sarah Pearl Camiling, Trend Micro Research
Silent Threat: Red Team Tool EDRSilencer Disrupting Endpoint Security Solutions
EDRSilencer
2024-10-15Weixin360 Threat Intelligence Center
Analysis of the attack activities of APT-C-35 (belly brain worm) against a manufacturing company in South Asia
Unidentified 117 (Donot Loader)
2024-10-14Trend MicroAdremel Redondo, Adriel Isidro, Andre Filipe Codod, Charles Adrian Marty, Christian Alpuerto, Kim Benedict Victorio, Lorenzo Laureano, Mark Jason Co
Water Makara Uses Obfuscated JavaScript in Spear Phishing Campaign, Targets Brazil With Astaroth Malware
Astaroth Water Makara
2024-10-14cybleCyble
Hidden in Plain Sight: ErrorFather’s Deadly Deployment of Cerberus
ErrorFather
2024-10-13ElasticRemco Sprooten, Ruben Groenewoud
Declawing PUMAKIT
PUMAKIT
2024-10-13Doubleagent.nethaxrob
FASTCash for Linux
FastCash
2024-10-12QianxinQianxin Threat Intelligence Center
Bitter Group Launches New Trojan Miyarat, Domestic Users Become Primary Ttargets
MiyaRAT
2024-10-11Nextron SystemsNextron Threat Research Team
In-Depth Analysis of Lynx Ransomware
Lynx
2024-10-11Trend MicroAhmed Kamal, Bahaa Yamany, Mohamed Fahmy, Nick Dai
Earth Simnavaz (aka APT34) Levies Advanced Cyberattacks Against Middle East
STEALHOOK OilRig
2024-10-11zimperiumAazim Yaswant
Expanding the Investigation: Deep Dive into Latest TrickMo Samples
TrickMo
2024-10-11Trend MicroAhmed Kamal, Bahaa Yamany, Mohamed Fahmy, Nick Dai
Earth Simnavaz (aka APT34) Levies Advanced Cyberattacks Against UAE and Gulf Regions
STEALHOOK
2024-10-10paloalto Netoworks: Unit42Benjamin Chang, Micah Yates, Pranay Kumar Chhaparwal
Lynx Ransomware: A Rebranding of INC Ransomware
INC Lynx
2024-10-10NCSC UKNCSC UK
Russian foreign intelligence poses global threat with cyber campaign exploiting established vulnerabilities
2024-10-10US Department of DefenseCNMF, NCSC UK, NSA, US Department of Justice
Update on SVR Cyber Operations and Vulnerability Exploitation
2024-10-10NCSC SwitzerlandNCSC Switzerland
Brief technical analysis of the "Gorilla" botnet
Gorilla Gorilla
2024-10-10ZscalerMuhammed Irfan V A
Technical Analysis of DarkVision RAT
DarkVision RAT
2024-10-10Security BoulevardJeffrey Burt
Internet Archive is Attacked and 31 Million Files Stolen
Blackmeta
2024-10-10SOCRadarSOCRadar
Internet Archive Data Breach and DDoS Attacks: What You Need to Know
Blackmeta
2024-10-10DomainToolsSteve Behm
Uncovering Domains Created by Octo2’s Domain Generation Algorithm
Coper