Click here to download all references as Bib-File.•
2024-11-28
⋅
Hunt.io
⋅
Uncovering Threat Actor Tactics: How Open Directories Provide Insight into XWorm Delivery Strategies XWorm |
2024-11-27
⋅
Rapid7
⋅
New “CleverSoar” Installer Targets Chinese and Vietnamese Users ValleyRAT |
2024-11-26
⋅
Reco AI
⋅
Stealth in the Cloud: How APT36's ElizaRAT is Redefining Cyber Espionage ElizaRAT Operation C-Major |
2024-11-26
⋅
Security Intelligence
⋅
What’s up India? PixPirate is back and spreading via WhatsApp PixPirate |
2024-11-25
⋅
LinkedIn (Idan Tarab)
⋅
The IT Army of Ukraine: Cyber Resistance in the Digital Battlefield |
2024-11-22
⋅
Microsoft
⋅
Microsoft shares latest intelligence on North Korean and Chinese threat actors at CYBERWARCON Storm-2077 |
2024-11-22
⋅
Volexity
⋅
The Nearest Neighbor Attack: How A Russian APT Weaponized Nearby Wi-Fi Networks for Covert Access APT28 |
2024-11-21
⋅
Recorded Future
⋅
Russia-Aligned TAG-110 Targets Asia and Europe with HATVIBE and CHERRYSPY HATVIBE |
2024-11-20
⋅
Cofense
⋅
Custom I2P RAT “I2Parcae” Delivered via Pornographic Customer Support Form Spam I2PRAT Unidentified 118 |
2024-11-20
⋅
SPUR
⋅
The Threat of Residential Proxies to Sanctions Compliance |
2024-11-20
⋅
Natto Thoughts
⋅
Salt Typhoon: Churning Up a Storm of Consternation |
2024-11-20
⋅
Orange Cyberdefense
⋅
The hidden network: How China unites state, corporate, and academic assets for cyber offensive campaigns |
2024-11-20
⋅
Trellix
⋅
Phobos: Stealthy Ransomware That Operated Under the Radar - Until Now 8Base CryptXXXX Dharma Phobos |
2024-11-19
⋅
Trend Micro
⋅
Spot the Difference: Earth Kasha's New LODEINFO Campaign And The Correlation Analysis With The APT10 Umbrella Cobalt Strike LODEINFO NOOPDOOR MirrorFace |
2024-11-19
⋅
Palo Alto Networks Unit 42
⋅
FrostyGoop’s Zoom-In: A Closer Look into the Malware Artifacts, Behaviors and Network Communications FrostyGoop |
2024-11-19
⋅
Australian Signals Directorate
⋅
Annual Cyber Threat Report 2023-2024 |
2024-11-19
⋅
CrowdStrike
⋅
Unveiling LIMINAL PANDA: A Closer Look at China's Cyber Threats to the Telecom Sector LIMINAL PANDA |
2024-11-19
⋅
Hunt.io
⋅
XenoRAT Adopts Excel XLL Files and ConfuserEx as Access Method XenoRAT |
2024-11-18
⋅
Kroll
⋅
CARBANAK (aka ANUNAK) Distributed via IDATLOADER (aka HIJACKLOADER) Carbanak HijackLoader |
2024-11-18
⋅
Blackberry
⋅
Suspected Nation-State Adversary Targets Pakistan Navy in Cyber Espionage Campaign Sync-Scheduler |