Click here to download all references as Bib-File.•
2024-09-30
⋅
The DFIR Report
⋅
Nitrogen Campaign Drops Sliver and Ends With BlackCat Ransomware BlackCat Nitrogen Loader Sliver |
2024-09-27
⋅
Elastic
⋅
Betting on Bots: Investigating Linux malware, crypto mining, and gambling API abuse Kaiji RudeDevil |
2024-09-26
⋅
cyble
⋅
Nexe Backdoor Unleashed: Patchwork APT Group’s Sophisticated Evasion of Defenses |
2024-09-26
⋅
The Wall Street Journal
⋅
China-Linked Hackers Breach U.S. Internet Providers in New ‘Salt Typhoon’ Cyberattack GhostEmperor |
2024-09-26
⋅
Microsoft
⋅
Storm-0501: Ransomware attacks expanding to hybrid cloud environments Storm-0501 |
2024-09-26
⋅
Gdata
⋅
BBTok Targeting Brazil: Deobfuscating the .NET Loader with dnlib and PowerShell BBtok |
2024-09-26
⋅
Recorded Future
⋅
Rhadamanthys Stealer Adds Innovative AI Feature in Version 0.7.0 Rhadamanthys |
2024-09-25
⋅
Cloudflare
⋅
Unraveling SloppyLemming’s Operations Across South Asia SloppyLemming |
2024-09-24
⋅
Trend Micro
⋅
Earth Preta Evolves its Attacks with New Malware and Strategies FDMTP |
2024-09-24
⋅
ThreatFabric
⋅
Octo2: European Banks Already Under Attack by New Malware Variant Coper |
2024-09-23
⋅
Palo Alto Networks Unit 42
⋅
Inside SnipBot: The Latest RomCom Malware Variant ROMCOM RAT |
2024-09-20
⋅
CISO Series
⋅
Cybersecurity News: INC targets healthcare, Providence schools cyberattack, Apple iPads bricked INC Storm-0494 |
2024-09-20
⋅
McAfee
⋅
Behind the CAPTCHA: A Clever Gateway of Malware Emmenhtal Lumma Stealer |
2024-09-19
⋅
Mandiant
⋅
UNC1860 and the Temple of Oats: Iran’s Hidden Hand in Middle Eastern Networks OATBOAT |
2024-09-19
⋅
Mandiant
⋅
UNC1860 and the Temple of Oats: Iran’s Hidden Hand in Middle Eastern Networks CRYPTOSLAY PipeSnoop TEMPLEDOOR UNC1860 |
2024-09-18
⋅
Twitter (@MsftSecIntel)
⋅
Tweet about threat actor Vanilla Tempest INC GootLoader Storm-0494 |
2024-09-18
⋅
People’s Republic of China-Linked Actors Compromise Routers and IoT Devices for Botnet Operations Nosedive |
2024-09-18
⋅
Court-Authorized Operation Disrupts Worldwide Botnet Used by People’s Republic of China State-Sponsored Hackers Nosedive |
2024-09-13
⋅
Aqua Nautilus
⋅
Hadooken Malware Targets Weblogic Applications Hadooken |
2024-09-12
⋅
Cado Security
⋅
From Automation to Exploitation: The Growing Misuse of Selenium Grid for Cryptomining and Proxyjacking perfctl |