Click here to download all references as Bib-File.•
| 2024-12-05
⋅
Trend Micro
⋅
MOONSHINE Exploit Kit and DarkNimbus Backdoor Enabling Earth Minotaur’s Multi-Platform Attacks |
| 2024-12-04
⋅
Rapid7
⋅
Black Basta Ransomware Campaign Drops Zbot, DarkGate, and Custom Malware Black Basta Cobalt Strike DarkGate SystemBC Zloader |
| 2024-12-04
⋅
Lumen
⋅
Snowblind: The Invisible Hand of Secret Blizzard Crimson RAT TwoDash |
| 2024-12-03
⋅
Hunt.io
⋅
Rare Watermark Links Cobalt Strike 4.10 Team Servers to Ongoing Suspicious Activity Cobalt Strike |
| 2024-12-03
⋅
BitSight
⋅
PROXY.AM Powered by Socks5Systemz Botnet Socks5 Systemz |
| 2024-12-02
⋅
Red Canary
⋅
Storm-1811 exploits RMM tools to drop Black Basta ransomware UNC4393 |
| 2024-12-02
⋅
TechSpot
⋅
Hacking group claims to have cracked Microsoft's software licensing security on a massive scale Massgrave |
| 2024-12-02
⋅
FortiGuard Labs
⋅
SmokeLoader Attack Targets Companies in Taiwan SmokeLoader |
| 2024-12-01
⋅
Northwave
⋅
LITTLELAMB.WOOLTEA: Stealthy Network Edge Device Backdoor |
| 2024-11-30
⋅
Technical Evolution
⋅
REKOOBE APT-31 Linux Backdoor Analysis Rekoobe |
| 2024-11-28
⋅
Hunt.io
⋅
Uncovering Threat Actor Tactics: How Open Directories Provide Insight into XWorm Delivery Strategies XWorm |
| 2024-11-26
⋅
Trend Micro
⋅
Guess Who’s Back - The Return of ANEL in the Recent Earth Kasha Spear-phishing Campaign in 2024 Anel MirrorFace |
| 2024-11-26
⋅
Security Intelligence
⋅
What’s up India? PixPirate is back and spreading via WhatsApp PixPirate |
| 2024-11-22
⋅
cocomelonc
⋅
Linux malware development 3: linux process injection with ptrace. Simple C example. EvilGnome HiddenWasp Turla RAT |
| 2024-11-22
⋅
Microsoft
⋅
Microsoft shares latest intelligence on North Korean and Chinese threat actors at CYBERWARCON Storm-2077 |
| 2024-11-22
⋅
Wired
⋅
Russian Spies Jumped From One Network to Another Via Wi-Fi in an Unprecedented Hack |
| 2024-11-22
⋅
Volexity
⋅
The Nearest Neighbor Attack: How A Russian APT Weaponized Nearby Wi-Fi Networks for Covert Access APT28 |
| 2024-11-20
⋅
Orange Cyberdefense
⋅
The hidden network: How China unites state, corporate, and academic assets for cyber offensive campaigns |
| 2024-11-20
⋅
Intrinsec
⋅
PROSPERO & Proton66: Tracing Uncovering the links between bulletproof networks Coper SpyNote FAKEUPDATES GootLoader EugenLoader IcedID Matanbuchus Nokoyawa Ransomware Pikabot |
| 2024-11-19
⋅
Palo Alto Networks Unit 42
⋅
FrostyGoop’s Zoom-In: A Closer Look into the Malware Artifacts, Behaviors and Network Communications FrostyGoop |