Click here to download all references as Bib-File.•
2024-09-18
⋅
Court-Authorized Operation Disrupts Worldwide Botnet Used by People’s Republic of China State-Sponsored Hackers Nosedive |
2024-09-18
⋅
Lumen
⋅
Derailing The Raptor Train Nosedive |
2024-09-17
⋅
NTD
⋅
Charges Against Alleged Chinese Military Hacker Unsealed |
2024-09-17
⋅
Mandiant
⋅
An Offer You Can Refuse: UNC2970 Backdoor Deployment Using Trojanized PDF Reader MISTPEN |
2024-09-13
⋅
Aqua Nautilus
⋅
Hadooken Malware Targets Weblogic Applications Hadooken |
2024-09-13
⋅
Bleeping Computer
⋅
New Linux malware Hadooken targets Oracle WebLogic servers Hadooken |
2024-09-12
⋅
Outpost24
⋅
Crystal Rans0m: Emerging hybrid ransomware with stealer capabilities Crystal Rans0m |
2024-09-12
⋅
Cado Security
⋅
From Automation to Exploitation: The Growing Misuse of Selenium Grid for Cryptomining and Proxyjacking perfctl |
2024-09-12
⋅
kienmanowar Blog
⋅
[QuickNote] The Xworm malware is being spread through a phishing email XWorm |
2024-09-11
⋅
Checkpoint
⋅
Targeted Iranian Attacks Against Iraqi Government Infrastructure Spereal Veaty |
2024-09-11
⋅
loginsoft
⋅
Akira Ransomware: The Evolution of a Major Threat Akira Akira |
2024-09-10
⋅
Intezer
⋅
There's Something About CryptBot: Yet Another Silly Stealer (YASS) CryptBot |
2024-09-10
⋅
Palo Alto Networks Unit 42
⋅
Threat Assessment: Repellent Scorpius, Distributors of Cicada3301 Ransomware Cicada3301 |
2024-09-10
⋅
Stacklok
⋅
Dependency hijacking: Dissecting North Korea’s new wave of DeFi-themed open source attacks targeting developers BeaverTail InvisibleFerret |
2024-09-10
⋅
ESET Research
⋅
CosmicBeetle steps up: Probation period at RansomHub Scarab Ransomware SpaceColon CosmicBeetle |
2024-09-10
⋅
Cleafy
⋅
A new TrickMo saga: from Banking Trojan to Victim's Data Leak TrickMo |
2024-09-10
⋅
ReversingLabs
⋅
Fake recruiter coding tests target devs with malicious Python packages |
2024-09-10
⋅
Talos Intelligence
⋅
DragonRank, a Chinese-speaking SEO manipulator service provider IISpy PlugX DragonRank |
2024-09-10
⋅
ThreatMon
⋅
Ailurophile Stealer Technical Malware Analysis Report |
2024-09-09
⋅
Denwp Research
⋅
Dissecting Lumma Malware: Analyzing the Fake CAPTCHA and Obfuscation Techniques - Part 2 Lumma Stealer |