Click here to download all references as Bib-File.

Enter keywords to filter the library entries below or Propose new Entry
2024-09-30The DFIR ReportThe DFIR Report
Nitrogen Campaign Drops Sliver and Ends With BlackCat Ransomware
BlackCat Nitrogen Loader Sliver
2024-09-27ElasticRemco Sprooten, Ruben Groenewoud
Betting on Bots: Investigating Linux malware, crypto mining, and gambling API abuse
Kaiji RudeDevil
2024-09-26cybleCyble
Nexe Backdoor Unleashed: Patchwork APT Group’s Sophisticated Evasion of Defenses
2024-09-26The Wall Street JournalDustin Volz, Robert McMillan, Sarah Krouse
China-Linked Hackers Breach U.S. Internet Providers in New ‘Salt Typhoon’ Cyberattack
GhostEmperor
2024-09-26MicrosoftMicrosoft Threat Intelligence
Storm-0501: Ransomware attacks expanding to hybrid cloud environments
Storm-0501
2024-09-26GdataKarsten Hahn, Marius Benthin
BBTok Targeting Brazil: Deobfuscating the .NET Loader with dnlib and PowerShell
BBtok
2024-09-26Recorded FutureInsikt Group
Rhadamanthys Stealer Adds Innovative AI Feature in Version 0.7.0
Rhadamanthys
2024-09-25CloudflareCloudforce One
Unraveling SloppyLemming’s Operations Across South Asia
SloppyLemming
2024-09-24Trend MicroLenart Bermejo, Sunny Lu, Ted Lee
Earth Preta Evolves its Attacks with New Malware and Strategies
FDMTP
2024-09-24ThreatFabricThreatFabric
Octo2: European Banks Already Under Attack by New Malware Variant
Coper
2024-09-23Palo Alto Networks Unit 42Dominik Reichel, Yaron Samuel
Inside SnipBot: The Latest RomCom Malware Variant
ROMCOM RAT
2024-09-20CISO SeriesSteve Prentice
Cybersecurity News: INC targets healthcare, Providence schools cyberattack, Apple iPads bricked
INC Storm-0494
2024-09-20McAfeeAayush Tyagi, Yashvi Shah
Behind the CAPTCHA: A Clever Gateway of Malware
Emmenhtal Lumma Stealer
2024-09-19MandiantMark Lechtik, Matan Mimran, Sarah Bock, Stav Shulman
UNC1860 and the Temple of Oats: Iran’s Hidden Hand in Middle Eastern Networks
OATBOAT
2024-09-19MandiantMark Lechtik, Matan Mimran, Sarah Bock, Stav Shulman
UNC1860 and the Temple of Oats: Iran’s Hidden Hand in Middle Eastern Networks
CRYPTOSLAY PipeSnoop TEMPLEDOOR UNC1860
2024-09-18Twitter (@MsftSecIntel)Microsoft
Tweet about threat actor Vanilla Tempest
INC GootLoader Storm-0494
2024-09-18ASD, CNMF, CSE Canada, FBI, GCSB, NCSC UK, NSA
People’s Republic of China-Linked Actors Compromise Routers and IoT Devices for Botnet Operations
Nosedive
2024-09-18U.S. Department of Justice
Court-Authorized Operation Disrupts Worldwide Botnet Used by People’s Republic of China State-Sponsored Hackers
Nosedive
2024-09-13Aqua NautilusAssaf Morag
Hadooken Malware Targets Weblogic Applications
Hadooken
2024-09-12Cado SecurityNate Bill, Tara Gould
From Automation to Exploitation: The Growing Misuse of Selenium Grid for Cryptomining and Proxyjacking
perfctl