Click here to download all references as Bib-File.•
2024-11-20
⋅
Intrinsec
⋅
PROSPERO & Proton66: Tracing Uncovering the links between bulletproof networks Coper SpyNote FAKEUPDATES GootLoader EugenLoader IcedID Matanbuchus Nokoyawa Ransomware Pikabot |
2024-11-19
⋅
Zscaler
⋅
Unraveling Raspberry Robin's Layers: Analyzing Obfuscation Techniques and Core Mechanisms Raspberry Robin Roshtyak |
2024-11-19
⋅
Trend Micro
⋅
Spot the Difference: Earth Kasha's New LODEINFO Campaign And The Correlation Analysis With The APT10 Umbrella Cobalt Strike LODEINFO NOOPDOOR MirrorFace |
2024-11-19
⋅
Palo Alto Networks Unit 42
⋅
FrostyGoop’s Zoom-In: A Closer Look into the Malware Artifacts, Behaviors and Network Communications FrostyGoop |
2024-11-19
⋅
CrowdStrike
⋅
Unveiling LIMINAL PANDA: A Closer Look at China's Cyber Threats to the Telecom Sector LIMINAL PANDA |
2024-11-19
⋅
Lumen
⋅
One Sock Fits All: The Use And Abuse Of The NSOCKS Botnet Ngioweb Ngioweb |
2024-11-18
⋅
Proofpoint
⋅
Security Brief: ClickFix Social Engineering Technique Floods Threat Landscape AsyncRAT Brute Ratel C4 DanaBot DarkGate Latrodectus Lumma Stealer NetSupportManager RAT XWorm |
2024-11-18
⋅
Kroll
⋅
CARBANAK (aka ANUNAK) Distributed via IDATLOADER (aka HIJACKLOADER) Carbanak HijackLoader |
2024-11-18
⋅
Blackberry
⋅
Suspected Nation-State Adversary Targets Pakistan Navy in Cyber Espionage Campaign Sync-Scheduler |
2024-11-18
⋅
Trend Micro
⋅
Inside Water Barghest’s Rapid Exploit-to-Market Strategy for IoT Devices Ngioweb |
2024-11-18
⋅
Trend Micro
⋅
Inside Water Barghest’s Rapid Exploit-to-Market Strategy for IoT Devices Ngioweb Water Barghest |
2024-11-18
⋅
Trend Micro
⋅
Inside Water Barghests Rapid Exploit-to-Market Strategy for IoT Devices Ngioweb |
2024-11-15
⋅
Information Security Buzz
⋅
Iranian “Dream Job” Cyber Campaign Targets Aerospace Sector TA455 |
2024-11-14
⋅
Cisco Talos
⋅
New PXA Stealer targets government and education sectors for sensitive information PXA Stealer |
2024-11-14
⋅
EclecticIQ
⋅
Inside Intelligence Center: Financially Motivated Chinese Threat Actor SilkSpecter Targeting Black Friday Shoppers SilkSpecter |
2024-11-14
⋅
cyjax
⋅
An elephant in Kairos: data-leak site emerges for new extortion group Kairos |
2024-11-14
⋅
Palo Alto
⋅
Fake North Korean IT Worker Linked to BeaverTail Video Conference App Phishing Attack BeaverTail InvisibleFerret WageMole |
2024-11-13
⋅
ClearSky
⋅
New Zero-Day Vulnerability Detected: CVE-2024-43451 SparkRAT |
2024-11-13
⋅
ANY.RUN
⋅
HawkEye Malware: Technical Analysis HawkEye Keylogger |
2024-11-13
⋅
Sekoia
⋅
A three-beat waltz: The ecosystem behind Chinese state-sponsored cyber threats |