Click here to download all references as Bib-File.•
| 2024-10-11
⋅
HarfangLab
⋅
HijackLoader evolution: abusing genuine signing certificates HijackLoader |
| 2024-10-11
⋅
Nextron Systems
⋅
In-Depth Analysis of Lynx Ransomware Lynx |
| 2024-10-11
⋅
Trend Micro
⋅
Earth Simnavaz (aka APT34) Levies Advanced Cyberattacks Against Middle East STEALHOOK OilRig |
| 2024-10-11
⋅
zimperium
⋅
Expanding the Investigation: Deep Dive into Latest TrickMo Samples TrickMo |
| 2024-10-11
⋅
Trend Micro
⋅
Earth Simnavaz (aka APT34) Levies Advanced Cyberattacks Against UAE and Gulf Regions STEALHOOK |
| 2024-10-10
⋅
Red Canary
⋅
Apple picking: Bobbing for Atomic Stealer & other macOS malware AMOS |
| 2024-10-10
⋅
Hunt.io
⋅
Unmasking Adversary Infrastructure: How Certificates and Redirects Exposed Earth Baxia and PlugX Activity Cobalt Strike PlugX |
| 2024-10-10
⋅
paloalto Netoworks: Unit42
⋅
Lynx Ransomware: A Rebranding of INC Ransomware INC Lynx |
| 2024-10-10
⋅
NCSC UK
⋅
Russian foreign intelligence poses global threat with cyber campaign exploiting established vulnerabilities |
| 2024-10-10
⋅
US Department of Defense
⋅
Update on SVR Cyber Operations and Vulnerability Exploitation |
| 2024-10-10
⋅
NCSC Switzerland
⋅
Brief technical analysis of the "Gorilla" botnet Gorilla Gorilla |
| 2024-10-10
⋅
Zscaler
⋅
Technical Analysis of DarkVision RAT DarkVision RAT |
| 2024-10-10
⋅
Security Boulevard
⋅
Internet Archive is Attacked and 31 Million Files Stolen Blackmeta |
| 2024-10-10
⋅
SOCRadar
⋅
Internet Archive Data Breach and DDoS Attacks: What You Need to Know Blackmeta |
| 2024-10-10
⋅
DomainTools
⋅
Uncovering Domains Created by Octo2’s Domain Generation Algorithm Coper |
| 2024-10-09
⋅
Recorded Future
⋅
Outmaneuvering Rhysida: How Advanced Threat Intelligence Shields Critical Infrastructure from Ransomware Broomstick Rhysida |
| 2024-10-09
⋅
Palo Alto
⋅
Contagious Interview: DPRK Threat Actors Lure Tech Industry Job Seekers to Install New Variants of BeaverTail and InvisibleFerret Malware BeaverTail Beavertail |
| 2024-10-08
⋅
Trustwave
⋅
Pronsis Loader: A JPHP-Driven Malware Diverging from D3F@ck Loader Pronsis Loader Latrodectus Lumma Stealer |
| 2024-10-08
⋅
Hunt.io
⋅
Inside a Cybercriminal’s Server: DDoS Tools, Spyware APKs, and Phishing Pages SpyNote |
| 2024-10-07
⋅
Kaspersky Labs
⋅
Awaken Likho is awake: new techniques of an APT group Awaken Likho |