Click here to download all references as Bib-File.•
2025-02-13
⋅
Securonix
⋅
Analyzing DEEP#DRIVE: North Korean Threat Actors Observed Exploiting Trusted Platforms for Targeted Attacks RandomQuery |
2025-02-13
⋅
Intel 471
⋅
Threat hunting case study: SocGholish FAKEUPDATES |
2025-02-13
⋅
Symantec
⋅
China-linked Espionage Tools Used in Ransomware Attacks PlugX |
2025-02-13
⋅
Recorded Future
⋅
Inside the Scam: North Korea’s IT Worker Threat BeaverTail OtterCookie InvisibleFerret |
2025-02-13
⋅
Microsoft
⋅
Storm-2372 conducts device code phishing campaign Storm-2372 |
2025-02-13
⋅
Volexity
⋅
Multiple Russian Threat Actors Targeting Microsoft Device Code Authentication |
2025-02-12
⋅
Microsoft
⋅
The BadPilot campaign: Seashell Blizzard subgroup conducts multiyear global access operation LocalOlive |
2025-02-11
⋅
Twitter (@MsftSecIntel)
⋅
Twitter Thread on a new Kimsuky tactic inciting admins to paste powershell |
2025-02-06
⋅
Microsoft
⋅
Code injection attacks using publicly disclosed ASP.NET machine keys |
2025-01-27
⋅
Zscaler
⋅
Technical Analysis of Xloader Versions 6 and 7 | Part 1 Xloader |
2025-01-23
⋅
ThreatMon
⋅
Helldown Ransomware Malware Analysis Report HellDown |
2025-01-21
⋅
Twitter (@MsftSecIntel)
⋅
Twitter Thread describing spotting of ReedBed in a Storm-1811 campaign ReedBed UNC4393 |
2025-01-17
⋅
Google Cloud Security
⋅
Threat Horizons - H1 2025 Threat Horizons Report FAKEUPDATES Conti Hades LockBit Phoenix Locker RansomHub TRIPLESTRENGTH |
2025-01-16
⋅
Microsoft
⋅
New Star Blizzard spear-phishing campaign targets WhatsApp accounts |
2025-01-16
⋅
eSentire
⋅
MintsLoader: StealC and BOINC Delivery MintsLoader Stealc |
2025-01-16
⋅
Fortinet
⋅
Analysis of Threat Actor Data Posting Belsen Group |
2025-01-10
⋅
Spamhaus
⋅
Spamhaus Botnet Threat Update July to December 2024 Coper FluBot Hook Mirai FAKEUPDATES AsyncRAT BianLian Brute Ratel C4 Cobalt Strike DanaBot DCRat Havoc Latrodectus NjRAT Quasar RAT RedLine Stealer Remcos Rhadamanthys Sliver Stealc |
2025-01-08
⋅
ThreatMon
⋅
Akira Ransomware Group & Malware Analysis Report Akira |
2024-12-26
⋅
⋅
Weixin
⋅
Analysis of the attack activities of APT-C-26 (Lazarus) using weaponized IPMsg software ComeBacker |
2024-12-24
⋅
LinkedIn (Idan Tarab)
⋅
Under Siege: Sandworm's Fake Army+ App Threatens Ukraine’s Military Operations |