Click here to download all references as Bib-File.•
2024-10-15
⋅
Microsoft
⋅
Phish, Click, Breach: Hunting for a Sophisticated Cyber Attack UNC4393 |
2024-10-15
⋅
⋅
Weixin
⋅
Analysis of the attack activities of APT-C-35 (belly brain worm) against a manufacturing company in South Asia Unidentified 117 (Donot Loader) |
2024-10-14
⋅
Trend Micro
⋅
Water Makara Uses Obfuscated JavaScript in Spear Phishing Campaign, Targets Brazil With Astaroth Malware Astaroth Water Makara |
2024-10-13
⋅
Elastic
⋅
Declawing PUMAKIT PUMAKIT |
2024-10-11
⋅
HarfangLab
⋅
HijackLoader evolution: abusing genuine signing certificates HijackLoader |
2024-10-11
⋅
Trend Micro
⋅
Earth Simnavaz (aka APT34) Levies Advanced Cyberattacks Against Middle East STEALHOOK OilRig |
2024-10-11
⋅
zimperium
⋅
Expanding the Investigation: Deep Dive into Latest TrickMo Samples TrickMo |
2024-10-11
⋅
Trend Micro
⋅
Earth Simnavaz (aka APT34) Levies Advanced Cyberattacks Against UAE and Gulf Regions STEALHOOK |
2024-10-10
⋅
Hunt.io
⋅
Unmasking Adversary Infrastructure: How Certificates and Redirects Exposed Earth Baxia and PlugX Activity Cobalt Strike PlugX |
2024-10-10
⋅
paloalto Netoworks: Unit42
⋅
Lynx Ransomware: A Rebranding of INC Ransomware INC Lynx |
2024-10-10
⋅
NCSC UK
⋅
Russian foreign intelligence poses global threat with cyber campaign exploiting established vulnerabilities |
2024-10-10
⋅
US Department of Defense
⋅
Update on SVR Cyber Operations and Vulnerability Exploitation |
2024-10-10
⋅
Zscaler
⋅
Technical Analysis of DarkVision RAT DarkVision RAT |
2024-10-10
⋅
Security Boulevard
⋅
Internet Archive is Attacked and 31 Million Files Stolen Blackmeta |
2024-10-10
⋅
SOCRadar
⋅
Internet Archive Data Breach and DDoS Attacks: What You Need to Know Blackmeta |
2024-10-09
⋅
Recorded Future
⋅
Outmaneuvering Rhysida: How Advanced Threat Intelligence Shields Critical Infrastructure from Ransomware Broomstick Rhysida |
2024-10-09
⋅
Palo Alto
⋅
Contagious Interview: DPRK Threat Actors Lure Tech Industry Job Seekers to Install New Variants of BeaverTail and InvisibleFerret Malware BeaverTail Beavertail |
2024-10-08
⋅
Trustwave
⋅
Pronsis Loader: A JPHP-Driven Malware Diverging from D3F@ck Loader Pronsis Loader Latrodectus Lumma Stealer |
2024-10-08
⋅
Hunt.io
⋅
Inside a Cybercriminal’s Server: DDoS Tools, Spyware APKs, and Phishing Pages SpyNote |
2024-10-07
⋅
Kaspersky Labs
⋅
Awaken Likho is awake: new techniques of an APT group Awaken Likho |