Click here to download all references as Bib-File.

Enter keywords to filter the library entries below or Propose new Entry
2024-10-15MicrosoftAkash Chaudhuri, Gourav Khandelwal, Krithika Ramakrishnan, Matthew Mesa, Sagar Patil, Uri Oren
Phish, Click, Breach: Hunting for a Sophisticated Cyber Attack
UNC4393
2024-10-15Trend MicroCj Arsley Mateo, Jacob Santos, Sarah Pearl Camiling, Trend Micro Research
Silent Threat: Red Team Tool EDRSilencer Disrupting Endpoint Security Solutions
EDRSilencer
2024-10-15Weixin360 Threat Intelligence Center
Analysis of the attack activities of APT-C-35 (belly brain worm) against a manufacturing company in South Asia
Unidentified 117 (Donot Loader)
2024-10-14Trend MicroAdremel Redondo, Adriel Isidro, Andre Filipe Codod, Charles Adrian Marty, Christian Alpuerto, Kim Benedict Victorio, Lorenzo Laureano, Mark Jason Co
Water Makara Uses Obfuscated JavaScript in Spear Phishing Campaign, Targets Brazil With Astaroth Malware
Astaroth Water Makara
2024-10-14cybleCyble
Hidden in Plain Sight: ErrorFather’s Deadly Deployment of Cerberus
ErrorFather
2024-10-12QianxinQianxin Threat Intelligence Center
Bitter Group Launches New Trojan Miyarat, Domestic Users Become Primary Ttargets
MiyaRAT
2024-10-11HarfangLabAlice Climent-Pommeret
HijackLoader evolution: abusing genuine signing certificates
HijackLoader
2024-10-11Nextron SystemsNextron Threat Research Team
In-Depth Analysis of Lynx Ransomware
Lynx
2024-10-11Trend MicroAhmed Kamal, Bahaa Yamany, Mohamed Fahmy, Nick Dai
Earth Simnavaz (aka APT34) Levies Advanced Cyberattacks Against Middle East
STEALHOOK OilRig
2024-10-11zimperiumAazim Yaswant
Expanding the Investigation: Deep Dive into Latest TrickMo Samples
TrickMo
2024-10-11Trend MicroAhmed Kamal, Bahaa Yamany, Mohamed Fahmy, Nick Dai
Earth Simnavaz (aka APT34) Levies Advanced Cyberattacks Against UAE and Gulf Regions
STEALHOOK
2024-10-10Hunt.ioHunt.io
Unmasking Adversary Infrastructure: How Certificates and Redirects Exposed Earth Baxia and PlugX Activity
Cobalt Strike PlugX
2024-10-10paloalto Netoworks: Unit42Benjamin Chang, Micah Yates, Pranay Kumar Chhaparwal
Lynx Ransomware: A Rebranding of INC Ransomware
INC Lynx
2024-10-10NCSC UKNCSC UK
Russian foreign intelligence poses global threat with cyber campaign exploiting established vulnerabilities
2024-10-10US Department of DefenseCNMF, NCSC UK, NSA, US Department of Justice
Update on SVR Cyber Operations and Vulnerability Exploitation
2024-10-10ZscalerMuhammed Irfan V A
Technical Analysis of DarkVision RAT
DarkVision RAT
2024-10-10Security BoulevardJeffrey Burt
Internet Archive is Attacked and 31 Million Files Stolen
Blackmeta
2024-10-10SOCRadarSOCRadar
Internet Archive Data Breach and DDoS Attacks: What You Need to Know
Blackmeta
2024-10-10DomainToolsSteve Behm
Uncovering Domains Created by Octo2’s Domain Generation Algorithm
Coper
2024-10-09Recorded FutureInsikt Group
Outmaneuvering Rhysida: How Advanced Threat Intelligence Shields Critical Infrastructure from Ransomware
Broomstick Rhysida