Click here to download all references as Bib-File.•
2024-10-31
⋅
Microsoft
⋅
Chinese threat actor Storm-0940 uses credentials from password spray attacks from a covert network Storm-0940 |
2024-10-30
⋅
EclecticIQ
⋅
Inside Intelligence Center: LUNAR SPIDER Enabling Ransomware Attacks on Financial Sector with Brute Ratel C4 and Latrodectus BlackCat Brute Ratel C4 Latrodectus |
2024-10-29
⋅
cyble
⋅
Phishing Campaign Targeting Ukraine: UAC-0215 Threatens National Security UAC-0215 |
2024-10-29
⋅
Microsoft
⋅
Midnight Blizzard conducts large-scale spear-phishing campaign using RDP files |
2024-10-28
⋅
Google
⋅
Hybrid Russian Espionage and Influence Campaign Aims to Compromise Ukrainian Military Recruits and Deliver Anti-Mobilization Narratives | Google Cloud Blog CraxsRAT Pronsis Loader PureLogs Stealer |
2024-10-28
⋅
Google
⋅
Hybrid Russian Espionage and Influence Campaign Aims to Compromise Ukrainian Military Recruits and Deliver Anti-Mobilization Narratives CraxsRAT Pronsis Loader PureLogs Stealer |
2024-10-25
⋅
Reliaquest
⋅
ReliaQuest Uncovers New Black Basta Social Engineering Technique Black Basta |
2024-10-24
⋅
Seqrite
⋅
Operation Cobalt Whisper: Threat Actor Targets Multiple Industries Across Hong Kong and Pakistan Cobalt Strike Operation Cobalt Whisper |
2024-10-24
⋅
Datadog
⋅
Tenacious Pungsan: A DPRK threat actor linked to Contagious Interview BeaverTail InvisibleFerret |
2024-10-23
⋅
Forescout
⋅
ICS Threats: Malware Targeting OT? It’s More Common Than You Think Aisuru |
2024-10-23
⋅
ThreatBook
⋅
Lazarus' Espionage-related Cryptocurrency Activities Remain Active, With A Significant Amount of Assets Still in Circulation |
2024-10-23
⋅
Cisco Talos
⋅
Threat Spotlight: WarmCookie/BadSpace Cobalt Strike csharp-streamer RAT WarmCookie |
2024-10-22
⋅
Cisco Talos
⋅
Threat actor abuses Gophish to deliver new PowerRAT and DCRAT PowerRAT |
2024-10-22
⋅
Twitter (@threatinsight)
⋅
Twitter Thread attributing Voldemort to TA415 (APT41, BrassTyphoon) Voldemort |
2024-10-17
⋅
Microsoft Security
⋅
New macOS vulnerability, “HM Surf”, could lead to unauthorized data access |
2024-10-16
⋅
ThreatMon
⋅
X-ZIGZAG Technical Malware Analysis Report AsyncRAT X-ZIGZAG |
2024-10-15
⋅
Trend Micro
⋅
Silent Threat: Red Team Tool EDRSilencer Disrupting Endpoint Security Solutions EDRSilencer |
2024-10-15
⋅
⋅
Weixin
⋅
Analysis of the attack activities of APT-C-35 (belly brain worm) against a manufacturing company in South Asia Unidentified 117 (Donot Loader) |
2024-10-12
⋅
Qianxin
⋅
Bitter Group Launches New Trojan Miyarat, Domestic Users Become Primary Ttargets MiyaRAT |
2024-10-11
⋅
Nextron Systems
⋅
In-Depth Analysis of Lynx Ransomware Lynx |