Click here to download all references as Bib-File.•
2024-12-10
⋅
Zscaler
⋅
Inside Zloader’s Latest Trick: DNS Tunneling Zloader |
2024-12-04
⋅
Microsoft
⋅
Frequent freeloader part I: Secret Blizzard compromising Storm-0156 infrastructure for espionage Crimson RAT MiniPocket TwoDash Wainscot Operation C-Major Storm-0473 |
2024-11-28
⋅
Hunt.io
⋅
Uncovering Threat Actor Tactics: How Open Directories Provide Insight into XWorm Delivery Strategies XWorm |
2024-11-22
⋅
Microsoft
⋅
Microsoft shares latest intelligence on North Korean and Chinese threat actors at CYBERWARCON Storm-2077 |
2024-11-20
⋅
SPUR
⋅
The Threat of Residential Proxies to Sanctions Compliance |
2024-11-19
⋅
Australian Signals Directorate
⋅
Annual Cyber Threat Report 2023-2024 |
2024-11-19
⋅
CrowdStrike
⋅
Unveiling LIMINAL PANDA: A Closer Look at China's Cyber Threats to the Telecom Sector Liminal Panda |
2024-11-14
⋅
EclecticIQ
⋅
Inside Intelligence Center: Financially Motivated Chinese Threat Actor SilkSpecter Targeting Black Friday Shoppers SilkSpecter |
2024-11-13
⋅
Sekoia
⋅
A three-beat waltz: The ecosystem behind Chinese state-sponsored cyber threats |
2024-11-12
⋅
SecurityScorecard
⋅
The Botnet is Back: SSC STRIKE Team Uncovers a Renewed Cyber Threat |
2024-11-06
⋅
YouTube ( Hexacon)
⋅
Caught in the wild - Past, present and future |
2024-10-31
⋅
Twitter (@MonThreat)
⋅
Tweet about EvilByte claiming to have hacked MyFatoorah Evilbyte |
2024-10-31
⋅
Hunt.io
⋅
Tricks, Treats, and Threats: Cobalt Strike & the Goblin Lurking in Plain Sight Cobalt Strike |
2024-10-31
⋅
Sophos X-Ops
⋅
Pacific Rim: Inside the Counter-Offensive—The TTPs Used to Neutralize China-Based Threats Asnarök |
2024-10-31
⋅
Microsoft
⋅
Chinese threat actor Storm-0940 uses credentials from password spray attacks from a covert network Storm-0940 |
2024-10-30
⋅
EclecticIQ
⋅
Inside Intelligence Center: LUNAR SPIDER Enabling Ransomware Attacks on Financial Sector with Brute Ratel C4 and Latrodectus BlackCat Brute Ratel C4 Latrodectus |
2024-10-29
⋅
cyble
⋅
Phishing Campaign Targeting Ukraine: UAC-0215 Threatens National Security UAC-0215 |
2024-10-29
⋅
Microsoft
⋅
Midnight Blizzard conducts large-scale spear-phishing campaign using RDP files |
2024-10-28
⋅
Google
⋅
Hybrid Russian Espionage and Influence Campaign Aims to Compromise Ukrainian Military Recruits and Deliver Anti-Mobilization Narratives | Google Cloud Blog CraxsRAT Pronsis Loader PureLogs Stealer |
2024-10-28
⋅
Google
⋅
Hybrid Russian Espionage and Influence Campaign Aims to Compromise Ukrainian Military Recruits and Deliver Anti-Mobilization Narratives CraxsRAT Pronsis Loader PureLogs Stealer |