Click here to download all references as Bib-File.•
2024-08-29
⋅
Proofpoint
⋅
The Malware That Must Not Be Named: Suspected Espionage Campaign Delivers “Voldemort” Voldemort |
2024-08-21
⋅
OODA Loop
⋅
Toyota Customer, Employee Data Leaked in Confirmed Data Breach ZeroSevenGroup |
2024-08-20
⋅
SiliconAngle
⋅
Toyota alleges stolen customer data published on hacking site came from outside supplier ZeroSevenGroup |
2024-07-26
⋅
Trellix
⋅
Handala’s Wiper Targets Israel Handala Hatef Handala |
2024-07-16
⋅
JPCERT/CC
⋅
MirrorFace Attack against Japanese Organisations LODEINFO NOOPDOOR |
2024-07-15
⋅
Sekoia
⋅
MuddyWater replaces Atera by custom MuddyRot implant in a recent campaign bugsleep |
2024-06-28
⋅
Trend Micro
⋅
Examining Water Sigbin's Infection Routine Leading to an XMRig Cryptominer Water Sigbin |
2024-06-25
⋅
Cado Security
⋅
From Dormant to Dangerous: P2Pinfect Evolves to Deploy New Ransomware and Cryptominer P2Pinfect |
2024-06-10
⋅
Mandiant
⋅
UNC5537 Targets Snowflake Customer Instances for Data Theft and Extortion Lumma Stealer MetaStealer Raccoon RedLine Stealer RisePro Vidar UNC5537 |
2024-06-03
⋅
SpyCloud
⋅
Reversing Atomic macOS Stealer: Binaries, Backdoors & Browser Theft AMOS |
2024-05-30
⋅
Akamai
⋅
RedTail Cryptominer Threat Actors Adopt PAN-OS CVE-2024-3400 Exploit RedTail |
2024-05-07
⋅
⋅
Gatewatcher
⋅
Cybercrime's Anatomy Threats to the Healthcare World |
2024-05-04
⋅
Medium MITRE-Engenuity
⋅
Technical Deep Dive: Understanding the Anatomy of a Cyber Intrusion WIREFIRE |
2024-04-22
⋅
Microsoft
⋅
Analyzing Forest Blizzard’s custom post-compromise tool for exploiting CVE-2022-38028 to obtain credentials GooseEgg |
2024-04-10
⋅
Proofpoint
⋅
Security Brief: TA547 Targets German Organizations with Rhadamanthys Stealer Rhadamanthys |
2024-04-08
⋅
Zscaler
⋅
Automating Pikabot’s String Deobfuscation Pikabot |
2024-03-18
⋅
Perception Point
⋅
Operation PhantomBlu: New and Evasive Method Delivers NetSupport RAT NetSupportManager RAT |
2024-03-18
⋅
PCrisk
⋅
FORCE (.FORCE) ransomware virus – removal and decryption options Phobos |
2024-03-04
⋅
Proofpoint
⋅
TA577’s Unusual Attack Chain Leads to NTLM Data Theft |
2024-02-29
⋅
CrowdStrike
⋅
The Anatomy of an ALPHA SPIDER Ransomware Attack BlackCat Alpha Spider |