Click here to download all references as Bib-File.•
2024-11-18
⋅
Trend Micro
⋅
Inside Water Barghest’s Rapid Exploit-to-Market Strategy for IoT Devices Ngioweb Water Barghest |
2024-11-18
⋅
Logpoint
⋅
Exploring Strela Stealer: Initial Payload Analysis and Insights StrelaStealer |
2024-11-18
⋅
Trend Micro
⋅
Inside Water Barghests Rapid Exploit-to-Market Strategy for IoT Devices Ngioweb |
2024-11-15
⋅
Information Security Buzz
⋅
Iranian “Dream Job” Cyber Campaign Targets Aerospace Sector TA455 |
2024-11-15
⋅
Volexity
⋅
BrazenBamboo Weaponizes FortiClient Vulnerability to Steal VPN Credentials via DEEPDATA lightSpy LIGHTSPY BH_A006 DEEPDATA DEEPPOST BrazenBamboo |
2024-11-14
⋅
EclecticIQ
⋅
Inside Intelligence Center: Financially Motivated Chinese Threat Actor SilkSpecter Targeting Black Friday Shoppers SilkSpecter |
2024-11-14
⋅
cyjax
⋅
An elephant in Kairos: data-leak site emerges for new extortion group Kairos |
2024-11-14
⋅
Palo Alto
⋅
Fake North Korean IT Worker Linked to BeaverTail Video Conference App Phishing Attack BeaverTail InvisibleFerret WageMole |
2024-11-13
⋅
Sekoia
⋅
A three-beat waltz: The ecosystem behind Chinese state-sponsored cyber threats |
2024-11-13
⋅
TEHTRIS
⋅
Cracking Formbook malware: Blind deobfuscation and quick response techniques Formbook |
2024-11-12
⋅
Blackberry
⋅
LightSpy: APT41 Deploys Advanced DeepData Framework In Targeted Southern Asia Espionage Campaign DEEPDATA |
2024-11-12
⋅
SecurityScorecard
⋅
The Botnet is Back: SSC STRIKE Team Uncovers a Renewed Cyber Threat |
2024-11-12
⋅
Hunt.io
⋅
Targeting Innovation: Sliver C2 and Ligolo-ng Used in Operation Aimed at Y Combinator Sliver |
2024-11-12
⋅
DataBreaches.net
⋅
Amazon confirms employee data breach after vendor hack Nam3L3ss |
2024-11-08
⋅
Fortinet
⋅
New Campaign Uses Remcos RAT to Exploit Victims Remcos |
2024-11-08
⋅
Trend Micro
⋅
Breaking Down Earth Estries' Persistent TTPs in Prolonged Cyber Operations |
2024-11-08
⋅
⋅
Rostelecom-Solar
⋅
The Elusive GoblinRAT – The Story Behind the Most Secretive and Mysterious Linux Backdoor Found in Government Infrastructures |
2024-11-07
⋅
Cisco Talos
⋅
Unwrapping the emerging Interlock ransomware attack Rhysida |
2024-11-07
⋅
ESET Research
⋅
APT Activity Report: Abusing Cloud Services and VPN Platforms in the Pursuit of New Prey FrostyNeighbor |
2024-11-07
⋅
Perception Point
⋅
Evasive ZIP Concatenation: Trojan Targets Windows Users SmokeLoader |