Click here to download all references as Bib-File.•
2023-06-15
⋅
eSentire
⋅
eSentire Threat Intelligence Malware Analysis: Resident Campaign Cobalt Strike Resident Rhadamanthys WarmCookie |
2023-06-15
⋅
eSentire
⋅
eSentire Threat Intelligence Malware Analysis: Aurora Stealer Aurora Stealer |
2023-06-15
⋅
Seqrite
⋅
Double Action, Triple Infection, and a New RAT: SideCopy’s Persistent Targeting of Indian Defence Action RAT |
2023-06-15
⋅
Symantec
⋅
Shuckworm: Inside Russia’s Relentless Cyber Campaign Against Ukraine Pteranodon |
2023-06-15
⋅
Mandiant
⋅
Barracuda ESG Zero-Day Vulnerability (CVE-2023-2868) Exploited Globally by Aggressive and Skilled Actor, Suspected Links to China SALTWATER SEASPY UNC4841 |
2023-06-15
⋅
Cado Security
⋅
Tracking Diicot: an emerging Romanian threat actor |
2023-06-14
⋅
PICUS Security
⋅
Picus Cyber Threat Intelligence Report May 2023: Top 10 MITRE ATT&CK Techniques Earth Longzhi |
2023-06-14
⋅
Microsoft
⋅
Cadet Blizzard emerges as a novel and distinct Russian threat actor p0wnyshell reGeorg WhisperGate DEV-0586 SaintBear |
2023-06-14
⋅
CISA
⋅
Understanding Ransomware Threat Actors: Lockbit LockBit |
2023-06-13
⋅
Trellix
⋅
Skuld: The Infostealer that Speaks Golang Skuld |
2023-06-13
⋅
Mandiant
⋅
VMware ESXi Zero-Day Used by Chinese Espionage Actor to Perform Privileged Guest Operations on Compromised Hypervisors |
2023-06-13
⋅
Outpost24
⋅
ICS attack classifications: differentiating between cyberwarfare, cyberterrorism, and hacktivism UAC-0118 |
2023-06-13
⋅
Mandiant
⋅
VMware ESXi Zero-Day Used by Chinese Espionage Actor to Perform Privileged Guest Operations on Compromised Hypervisors (UNC3886) UNC3886 |
2023-06-13
⋅
Snatch Ransomware — Techniques and Procedures |
2023-06-12
⋅
Sophos
⋅
Deep dive into the Pikabot cyber threat Pikabot |
2023-06-08
⋅
Microsoft
⋅
Detecting and mitigating a multi-stage AiTM phishing and BEC campaign Storm-1167 |
2023-06-08
⋅
VMRay
⋅
Busy Bees - The Transformation of BumbleBee BumbleBee Cobalt Strike Conti Meterpreter Sliver |
2023-06-08
⋅
DynamicRAT — A full-fledged Java Rat DynamicRAT |
2023-06-08
⋅
Check Point Research
⋅
Stealth Soldier Backdoor Used in Targeted Espionage Attacks in North Africa Stealth Soldier |
2023-06-06
⋅
Trend Micro
⋅
Xollam, the Latest Face of TargetCompany TargetCompany |