Click here to download all references as Bib-File.

Enter keywords to filter the library entries below or Propose new Entry
2024-09-20CISO SeriesSteve Prentice
Cybersecurity News: INC targets healthcare, Providence schools cyberattack, Apple iPads bricked
INC Storm-0494
2024-09-19Palo Alto Networks Unit 42Dominik Reichel
Discovering Splinter: A First Look at a New Post-Exploitation Red Team Tool
Splinter
2024-09-19MandiantMark Lechtik, Matan Mimran, Sarah Bock, Stav Shulman
UNC1860 and the Temple of Oats: Iran’s Hidden Hand in Middle Eastern Networks
OATBOAT
2024-09-19MandiantMark Lechtik, Matan Mimran, Sarah Bock, Stav Shulman
UNC1860 and the Temple of Oats: Iran’s Hidden Hand in Middle Eastern Networks
CRYPTOSLAY PipeSnoop TEMPLEDOOR UNC1860
2024-09-18loginsoftT B L N Shashank Mannar
Medusa Ransomware: Evolving Tactics in Modern Cyber Extortion
MedusaLocker
2024-09-18ASD, CNMF, CSE Canada, FBI, GCSB, NCSC UK, NSA
People’s Republic of China-Linked Actors Compromise Routers and IoT Devices for Botnet Operations
Nosedive
2024-09-18LumenBlack Lotus Labs
Derailing the Raptor Train
Nosedive
2024-09-18U.S. Department of Justice
Court-Authorized Operation Disrupts Worldwide Botnet Used by People’s Republic of China State-Sponsored Hackers
Nosedive
2024-09-18LumenBlack Lotus Labs
Derailing The Raptor Train
Nosedive
2024-09-17NTDCatherine Yang
Charges Against Alleged Chinese Military Hacker Unsealed
2024-09-17MandiantMandiant
An Offer You Can Refuse: UNC2970 Backdoor Deployment Using Trojanized PDF Reader
MISTPEN
2024-09-13Aqua NautilusAssaf Morag
Hadooken Malware Targets Weblogic Applications
Hadooken
2024-09-13Bleeping ComputerBill Toulas
New Linux malware Hadooken targets Oracle WebLogic servers
Hadooken
2024-09-12Outpost24KrakenLabs, Lidia López Sanz
Crystal Rans0m: Emerging hybrid ransomware with stealer capabilities
Crystal Rans0m
2024-09-12Cado SecurityNate Bill, Tara Gould
From Automation to Exploitation: The Growing Misuse of Selenium Grid for Cryptomining and Proxyjacking
perfctl
2024-09-12kienmanowar Blogm4n0w4r, Tran Trung Kien
[QuickNote] The Xworm malware is being spread through a phishing email
XWorm
2024-09-11CheckpointCheckpoint Research
Targeted Iranian Attacks Against Iraqi Government Infrastructure
Spereal Veaty
2024-09-11loginsoftT B L N Shashank Mannar
Akira Ransomware: The Evolution of a Major Threat
Akira Akira
2024-09-10StacklokStacklok
Dependency hijacking: Dissecting North Korea’s new wave of DeFi-themed open source attacks targeting developers
BeaverTail InvisibleFerret
2024-09-10Digvijay Mane
The Rise in APK Malware via WhatsApp – Exploiting Trust and Urgency