Click here to download all references as Bib-File.

Enter keywords to filter the library entries below or Propose new Entry
2024-09-06Trend MicroPierre Lee, Vickie Su
TIDRONE Targets Military and Satellite Industries in Taiwan
TIDRONE
2024-09-06splunkSplunk Threat Research Team
Handala’s Wiper: Threat Analysis and Detections
Handala Hatef Handala
2024-09-06Risky.bizCatalin Cimpanu
Risky Biz News: Doppelganger gets a kick in the butt from Uncle Sam
RaHDit
2024-09-06SpyCloudJames
The Curious Case of an Open Source Stealer: Phemedrone
Phemedrone Stealer
2024-09-05Republic of EstoniaProsecutor's Office
A GRU military unit launched cyberattacks against Estonian authorities
2024-09-05Estonian Ministry of Foreign Affairsavalike suhete osakond
Estonia names Russia’s military intelligence in a first-ever attribution of cyberattacks
2024-09-05NCSC UKNCSC UK
UK and allies uncover Russian military unit carrying out cyber attacks and digital sabotage for the first time
2024-09-05ZscalerGaetano Pellegrino
BlindEagle Targets Colombian Insurance Sector with BlotchyQuasar
Quasar RAT
2024-09-05FortinetCara Lin, Vincent Li
Threat Actors Exploit GeoServer Vulnerability CVE-2024-36401
SideWalk
2024-09-05Kaspersky LabsSherif Magdy
Tropic Trooper spies on government entities in the Middle East
2024-09-05IntegoJoshua Long
New macOS malware HZ RAT gives attackers backdoor access to Macs
HZ RAT
2024-09-04Group-IBSharmine Low
APT Lazarus: Eager Crypto Beavers, Video calls and Games
BeaverTail BeaverTail InvisibleFerret Beavertail
2024-09-04Natto ThoughtsNatto Team
Reconnaissance Scanning Tools Used by Chinese Threat Actors and Those Available in Open Source
scanbox Ladon Yasso
2024-09-04Check PointCheck Point
Hacktivists Call for Release of Telegram Founder with #FreeDurov DDoS Campaign
EvilWeb RipperSec
2024-09-04ANY.RUNANY.RUN, Mostafa ElSheimy
AZORult Malware: Technical Analysis
Azorult
2024-09-04CybershafaratTreadstone 71
Major IR leaks
IRLeaks
2024-09-04XLabAcey9, Alex.Turing, TF0xn
Uncovering DarkCracks: How a Stealthy Payload Delivery Framework Exploits GLPI and WordPress
DarkCracks
2024-09-04Trend MicroCedric Pernet, Jaromír Hořejší
Earth Lusca Uses KTLVdoor Backdoor for Multiplatform Intrusion
KTLVdoor KTLVdoor
2024-09-04cybleCyble
The Intricate Babylon RAT Campaign Targets Malaysian Politicians, Government
BabyLon RAT
2024-09-03DailyDarkWebDailyDarkWeb
LulzSec Black Claims Cyberattacks on Emirati Government and Other Sector Targets
LulzSec Black