Click here to download all references as Bib-File.

Enter keywords to filter the library entries below or Propose new Entry
2024-09-18U.S. Department of Justice
Court-Authorized Operation Disrupts Worldwide Botnet Used by People’s Republic of China State-Sponsored Hackers
Nosedive
2024-09-18LumenBlack Lotus Labs
Derailing The Raptor Train
Nosedive
2024-09-17NTDCatherine Yang
Charges Against Alleged Chinese Military Hacker Unsealed
2024-09-17MandiantMandiant
An Offer You Can Refuse: UNC2970 Backdoor Deployment Using Trojanized PDF Reader
MISTPEN
2024-09-13Bleeping ComputerBill Toulas
New Linux malware Hadooken targets Oracle WebLogic servers
Hadooken
2024-09-12Cado SecurityNate Bill, Tara Gould
From Automation to Exploitation: The Growing Misuse of Selenium Grid for Cryptomining and Proxyjacking
perfctl
2024-09-11CheckpointCheckpoint Research
Targeted Iranian Attacks Against Iraqi Government Infrastructure
Spereal Veaty
2024-09-10StacklokStacklok
Dependency hijacking: Dissecting North Korea’s new wave of DeFi-themed open source attacks targeting developers
BeaverTail InvisibleFerret
2024-09-10ReversingLabsKarlo Zanki
Fake recruiter coding tests target devs with malicious Python packages
2024-09-08WiredAndy Greenberg
A (Strange) Interview With the Russian-Military-Linked Hackers Targeting US Water Utilities
2024-09-05FortinetCara Lin, Vincent Li
Threat Actors Exploit GeoServer Vulnerability CVE-2024-36401
JenX SideWalk
2024-09-05Republic of EstoniaProsecutor's Office
A GRU military unit launched cyberattacks against Estonian authorities
2024-09-05Estonian Ministry of Foreign Affairsavalike suhete osakond
Estonia names Russia’s military intelligence in a first-ever attribution of cyberattacks
2024-09-05NCSC UKNCSC UK
UK and allies uncover Russian military unit carrying out cyber attacks and digital sabotage for the first time
2024-09-05IntegoJoshua Long
New macOS malware HZ RAT gives attackers backdoor access to Macs
HZ RAT
2024-09-04HarfangLabAlice Climent-Pommeret
Unpacking the unpleasant FIN7 gift: PackXOR
r77 xmrig
2024-09-04Natto ThoughtsNatto Team
Reconnaissance Scanning Tools Used by Chinese Threat Actors and Those Available in Open Source
scanbox Ladon Yasso
2024-09-04Check PointCheck Point
Hacktivists Call for Release of Telegram Founder with #FreeDurov DDoS Campaign
EvilWeb RipperSec
2024-09-04XLabAcey9, Alex.Turing, TF0xn
Uncovering DarkCracks: How a Stealthy Payload Delivery Framework Exploits GLPI and WordPress
DarkCracks
2024-09-04Trend MicroCedric Pernet, Jaromír Hořejší
Earth Lusca Uses KTLVdoor Backdoor for Multiplatform Intrusion
KTLVdoor KTLVdoor