Click here to download all references as Bib-File.•
2024-10-23
⋅
Trend Micro
⋅
Unmasking Prometei: A Deep Dive Into Our MXDR Findings Prometei |
2024-10-22
⋅
NCSC UK
⋅
Malware Analysis Report: Pigmy Goat PigmyGoat |
2024-10-22
⋅
Airbus
⋅
Incident Response: Analysis of recent version of BRC4 Brute Ratel C4 |
2024-10-22
⋅
Silent Push
⋅
Triad Nexus: Silent Push exposes FUNNULL CDN hosting DGA domains for suspect Chinese gambling sites, investment scams, a retail phishing campaign, and a polyfill.io supply chain attack impacting 110,000+ sites |
2024-10-22
⋅
Logpoint
⋅
Latrodectus: The Wrath of Black Widow Latrodectus |
2024-10-22
⋅
Kaspersky Labs
⋅
Grandoreiro, the global trojan with grandiose ambitions Grandoreiro |
2024-10-21
⋅
SOCRadar
⋅
Biggest Education Industry Attacks in 2024 OverFlame |
2024-10-21
⋅
VMRay
⋅
Latrodectus: A year in the making Latrodectus |
2024-10-19
⋅
Emanuele De Lucia on Security
⋅
“Hey ESET, Wait for the Leak”: Dissecting the “OctoberSeventh” Wiper targeting ESET customers in Israel OctoberSeventh |
2024-10-19
⋅
Elastic
⋅
Tricks and Treats: GHOSTPULSE’s new pixel- level deception HijackLoader |
2024-10-18
⋅
Netskope
⋅
New Bumblebee Loader Infection Chain Signals Possible Resurgence BumbleBee |
2024-10-18
⋅
SpyCloud
⋅
A Deep Dive Into the Intricate Chinese Cybercrime Ecosystem |
2024-10-17
⋅
Sekoia
⋅
ClickFix tactic: The Phantom Meet Rhadamanthys Stealc |
2024-10-17
⋅
Cisco Talos
⋅
UAT-5647 targets Ukrainian and Polish entities with RomCom malware variants MeltingClaw ROMCOM RAT ShadyHammock RomCom |
2024-10-17
⋅
Loader Insight Agency
⋅
Correlating Vidar Stealer Build IDs Based on Loader Tasks Lumma Stealer SmokeLoader Vidar |
2024-10-17
⋅
Hunt.io
⋅
From Warm to Burned: Shedding Light on Updated WarmCookie Infrastructure WarmCookie |
2024-10-16
⋅
nao_sec
⋅
IcePeony with the '996' work culture IceCache IceEvent IcePeony |
2024-10-16
⋅
BitSight
⋅
Exfiltration over Telegram Bots: Skidding Infostealer Logs 404 Keylogger Agent Tesla |
2024-10-16
⋅
Trend Micro
⋅
Fake LockBit, Real Damage: Ransomware Samples Abuse AWS S3 to Steal Data BockLit |
2024-10-16
⋅
ThreatMon
⋅
X-ZIGZAG Technical Malware Analysis Report AsyncRAT X-ZIGZAG |