Click here to download all references as Bib-File.•
2024-11-28
⋅
Hunt.io
⋅
Uncovering Threat Actor Tactics: How Open Directories Provide Insight into XWorm Delivery Strategies XWorm |
2024-11-28
⋅
StrikeReady
⋅
RU APT targeting Energy Infrastructure (Unknown unknowns, part 3) Edam Emmenhtal |
2024-11-27
⋅
ESET Research
⋅
Bootkitty: Analyzing the first UEFI bootkit for Linux Bootkitty |
2024-11-26
⋅
Security Intelligence
⋅
What’s up India? PixPirate is back and spreading via WhatsApp PixPirate |
2024-11-26
⋅
Security Affairs
⋅
The source code of Banshee Stealer leaked online BANSHEE |
2024-11-25
⋅
LinkedIn (Idan Tarab)
⋅
The IT Army of Ukraine: Cyber Resistance in the Digital Battlefield |
2024-11-22
⋅
Medium (@lcam)
⋅
How to target European SME with Ransomware? Through Zyxel! HellDown Babuk |
2024-11-22
⋅
Volexity
⋅
The Nearest Neighbor Attack: How A Russian APT Weaponized Nearby Wi-Fi Networks for Covert Access APT28 |
2024-11-21
⋅
ESET Research
⋅
Unveiling WolfsBane: Gelsemium’s Linux counterpart to Gelsevirine FireWood WolfsBane Icesword |
2024-11-21
⋅
Intrinsec
⋅
PROSPERO & Proton66: Uncovering the links between bulletproof networks Coper SpyNote FAKEUPDATES GootLoader EugenLoader |
2024-11-20
⋅
Orange Cyberdefense
⋅
The hidden network: How China unites state, corporate, and academic assets for cyber offensive campaigns |
2024-11-20
⋅
Trellix
⋅
Phobos: Stealthy Ransomware That Operated Under the Radar - Until Now 8Base CryptXXXX Dharma Phobos |
2024-11-20
⋅
Intrinsec
⋅
PROSPERO & Proton66: Tracing Uncovering the links between bulletproof networks Coper SpyNote FAKEUPDATES GootLoader EugenLoader IcedID Matanbuchus Nokoyawa Ransomware Pikabot |
2024-11-19
⋅
Lumen
⋅
One Sock Fits All: The Use And Abuse Of The NSOCKS Botnet Ngioweb Ngioweb |
2024-11-19
⋅
Hunt.io
⋅
XenoRAT Adopts Excel XLL Files and ConfuserEx as Access Method XenoRAT |
2024-11-18
⋅
TEHTRIS
⋅
Cryptbot downloader: A deep cryptanalysis CryptBot |
2024-11-18
⋅
Trend Micro
⋅
Inside Water Barghest’s Rapid Exploit-to-Market Strategy for IoT Devices Ngioweb |
2024-11-18
⋅
Trend Micro
⋅
Inside Water Barghest’s Rapid Exploit-to-Market Strategy for IoT Devices Ngioweb Water Barghest |
2024-11-18
⋅
Logpoint
⋅
Exploring Strela Stealer: Initial Payload Analysis and Insights StrelaStealer |
2024-11-18
⋅
Trend Micro
⋅
Inside Water Barghests Rapid Exploit-to-Market Strategy for IoT Devices Ngioweb |