Click here to download all references as Bib-File.•
2024-12-02
⋅
Red Canary
⋅
Storm-1811 exploits RMM tools to drop Black Basta ransomware UNC4393 |
2024-12-02
⋅
TechSpot
⋅
Hacking group claims to have cracked Microsoft's software licensing security on a massive scale Massgrave |
2024-12-02
⋅
FortiGuard Labs
⋅
SmokeLoader Attack Targets Companies in Taiwan SmokeLoader |
2024-11-30
⋅
Technical Evolution
⋅
REKOOBE APT-31 Linux Backdoor Analysis Rekoobe |
2024-11-28
⋅
Hunt.io
⋅
Uncovering Threat Actor Tactics: How Open Directories Provide Insight into XWorm Delivery Strategies XWorm |
2024-11-26
⋅
Trend Micro
⋅
Guess Who’s Back - The Return of ANEL in the Recent Earth Kasha Spear-phishing Campaign in 2024 Anel MirrorFace |
2024-11-26
⋅
Security Intelligence
⋅
What’s up India? PixPirate is back and spreading via WhatsApp PixPirate |
2024-11-22
⋅
cocomelonc
⋅
Linux malware development 3: linux process injection with ptrace. Simple C example. EvilGnome HiddenWasp Turla RAT |
2024-11-22
⋅
Microsoft
⋅
Microsoft shares latest intelligence on North Korean and Chinese threat actors at CYBERWARCON Storm-2077 |
2024-11-22
⋅
Wired
⋅
Russian Spies Jumped From One Network to Another Via Wi-Fi in an Unprecedented Hack |
2024-11-22
⋅
Volexity
⋅
The Nearest Neighbor Attack: How A Russian APT Weaponized Nearby Wi-Fi Networks for Covert Access APT28 |
2024-11-20
⋅
Orange Cyberdefense
⋅
The hidden network: How China unites state, corporate, and academic assets for cyber offensive campaigns |
2024-11-20
⋅
Intrinsec
⋅
PROSPERO & Proton66: Tracing Uncovering the links between bulletproof networks Coper SpyNote FAKEUPDATES GootLoader EugenLoader IcedID Matanbuchus Nokoyawa Ransomware Pikabot |
2024-11-19
⋅
Palo Alto Networks Unit 42
⋅
FrostyGoop’s Zoom-In: A Closer Look into the Malware Artifacts, Behaviors and Network Communications FrostyGoop |
2024-11-19
⋅
Lumen
⋅
One Sock Fits All: The Use And Abuse Of The NSOCKS Botnet Ngioweb Ngioweb |
2024-11-19
⋅
Hunt.io
⋅
XenoRAT Adopts Excel XLL Files and ConfuserEx as Access Method XenoRAT |
2024-11-18
⋅
Kroll
⋅
CARBANAK (aka ANUNAK) Distributed via IDATLOADER (aka HIJACKLOADER) Carbanak HijackLoader |
2024-11-18
⋅
Blackberry
⋅
Suspected Nation-State Adversary Targets Pakistan Navy in Cyber Espionage Campaign Sync-Scheduler |
2024-11-18
⋅
Trend Micro
⋅
Inside Water Barghest’s Rapid Exploit-to-Market Strategy for IoT Devices Ngioweb |
2024-11-18
⋅
Trend Micro
⋅
Inside Water Barghest’s Rapid Exploit-to-Market Strategy for IoT Devices Ngioweb Water Barghest |