Click here to download all references as Bib-File.•
2022-07-29
⋅
Trend Micro
⋅
Examining New DawDropper Banking Dropper and DaaS on the Dark Web Coper DawDropper |
2022-07-28
⋅
Sekoia
⋅
SEKOIA.IO Mid-2022 Ransomware Threat Landscape |
2022-07-27
⋅
PressTV
⋅
Iraqi hacker group 'ALtahrea Team' targets Israeli IT, e-commerce companies in major cyber attack: Reports Altahrea Team |
2022-07-26
⋅
Mandiant
⋅
Mandiant Red Team Emulates FIN11 Tactics To Control Operational Technology Servers Clop Industroyer MimiKatz Triton |
2022-07-26
⋅
splunk
⋅
ML Detection of Risky Command Exploit |
2022-07-26
⋅
Microsoft
⋅
Malicious IIS extensions quietly open persistent backdoors into servers CHINACHOPPER MimiKatz |
2022-07-22
⋅
Sekoia
⋅
CALISTO continues its credential harvesting campaign Callisto |
2022-07-21
⋅
Proofpoint
⋅
Buy, Sell, Steal, EvilNum Targets Cryptocurrency, Forex, Commodities EVILNUM Evilnum |
2022-07-21
⋅
⋅
ASEC
⋅
Dissemination of AppleSeed to Specific Military Maintenance Companies Appleseed |
2022-07-21
⋅
ASEC
⋅
Malware Being Distributed by Disguising Itself as Icon of V3 Lite Ave Maria |
2022-07-20
⋅
⋅
Qianxin
⋅
The Sidewinder (APT-Q-39) uses Google Play to spread an analysis of malicious Android software SideWinder |
2022-07-20
⋅
Malwarebytes
⋅
Google Ads Lead to Major Malvertising Campaign |
2022-07-18
⋅
Sekoia
⋅
Ongoing Roaming Mantis smishing campaign targeting France MoqHao |
2022-07-14
⋅
TechMonitor
⋅
Expert doubts Altahrea Team’s claims about Israel power plant fire Altahrea Team |
2022-07-14
⋅
Blackberry
⋅
GootLoader, From SEO Poisoning to Multi-Stage Downloader GootLoader |
2022-07-14
⋅
Proofpoint
⋅
Above the Fold and in Your Inbox: Tracing State-Aligned Activity Targeting Journalists, Media Chinoxy APT31 Lazarus Group TA482 |
2022-07-13
⋅
Microsoft
⋅
Uncovering a macOS App Sandbox escape vulnerability: A deep dive into CVE-2022-26706 |
2022-07-13
⋅
NCC Group
⋅
Climbing Mount Everest: Black-Byte Bytes Back? BlackByte |
2022-07-12
⋅
Team Cymru
⋅
An Analysis of Infrastructure linked to the Hagga Threat Actor Hagga |
2022-07-12
⋅
Microsoft
⋅
From cookie theft to BEC: Attackers use AiTM phishing sites as entry point to further financial fraud |