Click here to download all references as Bib-File.

Enter keywords to filter the library entries below or Propose new Entry
2024-09-24Trend MicroLenart Bermejo, Sunny Lu, Ted Lee
Earth Preta Evolves its Attacks with New Malware and Strategies
FDMTP
2024-09-24ThreatFabricThreatFabric
Octo2: European Banks Already Under Attack by New Malware Variant
Coper
2024-09-20CISO SeriesSteve Prentice
Cybersecurity News: INC targets healthcare, Providence schools cyberattack, Apple iPads bricked
INC Storm-0494
2024-09-19Trend MicroCyris Tseng, Philip Chen, Pierre Lee, Sunny Lu, Ted Lee
Earth Baxia Uses Spear-Phishing and GeoServer Exploit to Target APAC
Cobalt Strike Earth Baxia
2024-09-19Trend MicroCyris Tseng, Philip Chen, Pierre Lee, Sunny Lu, Ted Lee
Earth Baxia Uses Spear-Phishing and GeoServer Exploit to Target APAC (IoCs)
Cobalt Strike Earth Baxia
2024-09-18Twitter (@MsftSecIntel)Microsoft
Tweet about threat actor Vanilla Tempest
INC GootLoader Storm-0494
2024-09-18loginsoftT B L N Shashank Mannar
Medusa Ransomware: Evolving Tactics in Modern Cyber Extortion
MedusaLocker
2024-09-18ASD, CNMF, CSE Canada, FBI, GCSB, NCSC UK, NSA
People’s Republic of China-Linked Actors Compromise Routers and IoT Devices for Botnet Operations
Nosedive
2024-09-18LumenBlack Lotus Labs
Derailing the Raptor Train
Nosedive
2024-09-18U.S. Department of Justice
Court-Authorized Operation Disrupts Worldwide Botnet Used by People’s Republic of China State-Sponsored Hackers
Nosedive
2024-09-18LumenBlack Lotus Labs
Derailing The Raptor Train
Nosedive
2024-09-13Bleeping ComputerBill Toulas
New Linux malware Hadooken targets Oracle WebLogic servers
Hadooken
2024-09-12Cado SecurityNate Bill, Tara Gould
From Automation to Exploitation: The Growing Misuse of Selenium Grid for Cryptomining and Proxyjacking
perfctl
2024-09-11CheckpointCheckpoint Research
Targeted Iranian Attacks Against Iraqi Government Infrastructure
Spereal Veaty
2024-09-10StacklokStacklok
Dependency hijacking: Dissecting North Korea’s new wave of DeFi-themed open source attacks targeting developers
BeaverTail InvisibleFerret
2024-09-10ReversingLabsKarlo Zanki
Fake recruiter coding tests target devs with malicious Python packages
2024-09-08WiredAndy Greenberg
A (Strange) Interview With the Russian-Military-Linked Hackers Targeting US Water Utilities
2024-09-05FortinetCara Lin, Vincent Li
Threat Actors Exploit GeoServer Vulnerability CVE-2024-36401
SideWalk
2024-09-05IntegoJoshua Long
New macOS malware HZ RAT gives attackers backdoor access to Macs
HZ RAT
2024-09-04Check PointCheck Point
Hacktivists Call for Release of Telegram Founder with #FreeDurov DDoS Campaign
EvilWeb RipperSec