Click here to download all references as Bib-File.•
2024-04-15
⋅
Positive Technologies
⋅
SteganoAmor campaign: TA558 mass-attacking companies and public institutions all around the world LokiBot 404 Keylogger Agent Tesla CloudEyE Formbook Remcos XWorm |
2024-04-12
⋅
Volexity
⋅
Zero-Day Exploitation of Unauthenticated Remote Code Execution Vulnerability in GlobalProtect (CVE-2024-3400) UPSTYLE UTA0218 |
2024-04-12
⋅
Palo Alto Networks Unit 42
⋅
Threat Brief: Operation MidnightEclipse, Post-Exploitation Activity Related to CVE-2024-3400 UPSTYLE |
2024-04-11
⋅
Microsoft
⋅
How Microsoft discovers and mitigates evolving attacks against AI guardrails |
2024-04-11
⋅
Github (jeFF0Falltrades)
⋅
Rat King Configuration Parser AsyncRAT DCRat Quasar RAT Venom RAT |
2024-04-10
⋅
2024-04-10
⋅
XZ Utils Backdoor | Threat Actor Planned to Inject Further Vulnerabilities xzbot |
2024-04-10
⋅
2024-04-10
⋅
XZ Utils Backdoor | Threat Actor Planned to Inject Further Vulnerabilities xzbot |
2024-04-10
⋅
Proofpoint
⋅
Security Brief: TA547 Targets German Organizations with Rhadamanthys Stealer Rhadamanthys |
2024-04-10
⋅
Proofpoint
⋅
Security Brief: TA547 Targets German Organizations with Rhadamanthys Stealer Rhadamanthys |
2024-04-09
⋅
kienmanowar Blog
⋅
[QuickNote] Phishing email distributes WarZone RAT via DBatLoader Ave Maria DBatLoader |
2024-04-09
⋅
kienmanowar Blog
⋅
[QuickNote] Phishing email distributes WarZone RAT via DBatLoader Ave Maria DBatLoader |
2024-04-08
⋅
Zscaler
⋅
Automating Pikabot’s String Deobfuscation Pikabot |
2024-04-04
⋅
Microsoft
⋅
China tests US voter fault lines and ramps AI content to boost its geopolitical interests |
2024-04-04
⋅
Microsoft
⋅
China tests US voter fault lines and ramps AI content to boost its geopolitical interests |
2024-04-04
⋅
Mandiant
⋅
Cutting Edge, Part 4: Ivanti Connect Secure VPN Post-Exploitation Lateral Movement Case Studies |
2024-04-04
⋅
Mandiant
⋅
Cutting Edge, Part 4: Ivanti Connect Secure VPN Post-Exploitation Lateral Movement Case Studies |
2024-04-04
⋅
Mandiant
⋅
Cutting Edge, Part 4: Ivanti Connect Secure VPN Post-Exploitation Lateral Movement Case Studies |
2024-04-04
⋅
Mandiant
⋅
Cutting Edge, Part 4: Ivanti Connect Secure VPN Post-Exploitation Lateral Movement Case Studies |
2024-04-04
⋅
Mandiant
⋅
Cutting Edge, Part 4: Ivanti Connect Secure VPN Post-Exploitation Lateral Movement Case Studies |
2024-04-04
⋅
Mandiant
⋅
Cutting Edge, Part 4: Ivanti Connect Secure VPN Post-Exploitation Lateral Movement Case Studies |