Click here to download all references as Bib-File.•
2024-09-19
⋅
Mandiant
⋅
UNC1860 and the Temple of Oats: Iran’s Hidden Hand in Middle Eastern Networks OATBOAT |
2024-09-19
⋅
Mandiant
⋅
UNC1860 and the Temple of Oats: Iran’s Hidden Hand in Middle Eastern Networks CRYPTOSLAY PipeSnoop TEMPLEDOOR UNC1860 |
2024-09-19
⋅
Gen Digital
⋅
Evolution of Lazarus ‘FudModule - no longer (stand)alone’ FudModule |
2024-09-19
⋅
Trend Micro
⋅
Earth Baxia Uses Spear-Phishing and GeoServer Exploit to Target APAC Cobalt Strike Earth Baxia |
2024-09-19
⋅
Trend Micro
⋅
Earth Baxia Uses Spear-Phishing and GeoServer Exploit to Target APAC (IoCs) Cobalt Strike Earth Baxia |
2024-09-18
⋅
Group-IB
⋅
Storm clouds on the horizon: Resurgence of TeamTNT? TeamTNT |
2024-09-18
⋅
Twitter (@MsftSecIntel)
⋅
Tweet about threat actor Vanilla Tempest INC GootLoader Storm-0494 |
2024-09-18
⋅
loginsoft
⋅
Medusa Ransomware: Evolving Tactics in Modern Cyber Extortion MedusaLocker |
2024-09-18
⋅
People’s Republic of China-Linked Actors Compromise Routers and IoT Devices for Botnet Operations Nosedive |
2024-09-18
⋅
Lumen
⋅
Derailing the Raptor Train Nosedive |
2024-09-18
⋅
Court-Authorized Operation Disrupts Worldwide Botnet Used by People’s Republic of China State-Sponsored Hackers Nosedive |
2024-09-18
⋅
Lumen
⋅
Derailing The Raptor Train Nosedive |
2024-09-17
⋅
NTD
⋅
Charges Against Alleged Chinese Military Hacker Unsealed |
2024-09-17
⋅
Mandiant
⋅
An Offer You Can Refuse: UNC2970 Backdoor Deployment Using Trojanized PDF Reader MISTPEN |
2024-09-13
⋅
Aqua Nautilus
⋅
Hadooken Malware Targets Weblogic Applications Hadooken |
2024-09-13
⋅
Bleeping Computer
⋅
New Linux malware Hadooken targets Oracle WebLogic servers Hadooken |
2024-09-12
⋅
Dr. Web
⋅
Void captures over a million Android TV boxes vo1d |
2024-09-12
⋅
Outpost24
⋅
Crystal Rans0m: Emerging hybrid ransomware with stealer capabilities Crystal Rans0m |
2024-09-12
⋅
cocomelonc
⋅
Malware and cryptography 32: encrypt payload via FEAL-8 algorithm. Simple C example. |
2024-09-12
⋅
Cado Security
⋅
From Automation to Exploitation: The Growing Misuse of Selenium Grid for Cryptomining and Proxyjacking perfctl |