Click here to download all references as Bib-File.•
2024-09-18
⋅
People’s Republic of China-Linked Actors Compromise Routers and IoT Devices for Botnet Operations Nosedive |
2023-10-27
⋅
acsense
⋅
A Guide to Scattered Spider Data Breaches POORTRY |
2022-09-14
⋅
CISA
⋅
Alert (AA22-257A): Iranian Islamic Revolutionary Guard Corps-Affiliated Cyber Actors Exploiting Vulnerabilities for Data Extortion and Disk Encryption for Ransom Operations |
2021-05-01
⋅
CSET
⋅
China’s Foreign Technology Wish List |
2021-03-09
⋅
360 netlab
⋅
Threat Alert: z0Miner Is Spreading quickly by Exploiting ElasticSearch and Jenkins Vulnerabilities |
2018-01-22
⋅
Security Affairs
⋅
Op EvilTraffic CSE CybSec ZLAB Malware Analysis Report – Exclusive, tens of thousands of compromised sites involved in a new massive malvertising campaign EvilTraffic |
2017-08-09
⋅
CSE
⋅
Hackers are Humans too Satellite Turla |
2011-01-01
⋅
Spiegel Online
⋅
SNOWGLOBE: From Discovery to Attribution Babar |