Click here to download all references as Bib-File.•
2024-11-06
⋅
Sophos
⋅
Bengal cat lovers in Australia get psspsspss’d in Google-driven Gootloader campaign GootLoader |
2024-10-31
⋅
Microsoft
⋅
Chinese threat actor Storm-0940 uses credentials from password spray attacks from a covert network |
2024-10-18
⋅
SpyCloud
⋅
A Deep Dive Into the Intricate Chinese Cybercrime Ecosystem |
2024-10-08
⋅
Hunt.io
⋅
Inside a Cybercriminal’s Server: DDoS Tools, Spyware APKs, and Phishing Pages SpyNote |
2024-09-30
⋅
X (@GenThreatLabs)
⋅
Tweet on FAKEUPDATES pushing WARMCOOKIE backdoor via compromised websites targeting France FAKEUPDATES WarmCookie |
2024-09-25
⋅
The Register
⋅
China claims Taiwan, not civilians, behind web vandalism Anonymous64 |
2024-09-20
⋅
McAfee
⋅
Behind the CAPTCHA: A Clever Gateway of Malware Emmenhtal Lumma Stealer |
2024-09-10
⋅
Talos Intelligence
⋅
DragonRank, a Chinese-speaking SEO manipulator service provider IISpy PlugX DragonRank |
2024-08-21
⋅
OODA Loop
⋅
Toyota Customer, Employee Data Leaked in Confirmed Data Breach ZeroSevenGroup |
2024-08-08
⋅
NSFOCUS
⋅
New APT Group Actor240524: A Closer Look at Its Cyber Tactics Against Azerbaijan and Israel ABCsync Actor240524 |
2024-08-05
⋅
ThreatFabric
⋅
Chameleon is now targeting employees: Masquerading as a CRM app Chameleon |
2024-08-04
⋅
Twitter (@embee_research)
⋅
Decoding a Cobalt Strike Downloader Script With CyberChef Cobalt Strike |
2024-07-09
⋅
TG Soft
⋅
Italian government agencies and companies in the target of a Chinese APT 9002 RAT |
2024-07-08
⋅
⋅
Solar 4RAYS
⋅
Lifting Zmiy: hacking SCADA controllers in pursuit of prime victims Lifting Zmiy |
2024-06-12
⋅
The Cyber Express
⋅
Hack Alert: SN Blackmeta Claims Cyberattack on Snapchat Over Explicit Content and Alleged Political Bias! Blackmeta |
2024-06-05
⋅
QuoIntelligence
⋅
European Election Security At Risk: A Detailed Analysis of State-Sponsored, eCrime, and Hacktivist Threats Dragonbridge |
2024-06-05
⋅
⋅
Sekoia
⋅
The reverse engineering of malicious code in the ITC - Analysis of the evolution of a chain of infection (Slides) FlowCloud |
2024-05-04
⋅
Medium MITRE-Engenuity
⋅
Technical Deep Dive: Understanding the Anatomy of a Cyber Intrusion WIREFIRE |
2024-05-03
⋅
Aqua Nautilus
⋅
Kinsing Demystified: A Comprehensive Technical Guide Kinsing |
2024-05-01
⋅
Microsoft
⋅
“Dirty stream” attack: Discovering and mitigating a common vulnerability pattern in Android apps |