Click here to download all references as Bib-File.•
| 2025-05-08
⋅
Forescout
⋅
Threat Analysis: SAP Vulnerability Exploited in the Wild by Chinese Threat Actor Chaya_004 |
| 2025-03-13
⋅
Forescout
⋅
New Ransomware Operator Exploits Fortinet Vulnerability Duo BlackMatter LockBit Mora_001 |
| 2024-10-23
⋅
Forescout
⋅
ICS Threats: Malware Targeting OT? It’s More Common Than You Think Aisuru |
| 2024-07-18
⋅
Forescout
⋅
Emerging IoT Wiper Malware: Kaden and New LOLFME Botnet Variants Kaden |
| 2024-04-02
⋅
Forescout
⋅
“All your base are belong to us” – A probe into Chinese-connected devices in US networks |
| 2024-01-11
⋅
Forescout
⋅
Clearing the Fog of War – A critical analysis of recent energy sector cyberattacks in Denmark and Ukraine |
| 2022-04-21
⋅
Forescout
⋅
Analysis of an ALPHV incident BlackCat |