Click here to download all references as Bib-File.•
2025-02-10
⋅
HarfangLab
⋅
Further insights into Ivanti CSA 4.6 vulnerabilities exploitation Godzilla Webshell Behinder |
2024-08-14
⋅
HarfangLab
⋅
Cyclops: a likely replacement for BellaCiao BellaCiao Cyclops |
2024-07-25
⋅
HarfangLab
⋅
Mid-year Doppelgänger information operations in Europe and the US |
2024-06-28
⋅
HarfangLab
⋅
Supposed Grasshopper: operators impersonate Israeli government and private companies to deploy open-source malware donut_injector Sliver |
2024-05-28
⋅
HarfangLab
⋅
AllaSenha: AllaKore variant leverages Azure cloud C2 to steal banking details in Latin America AllaKore AllaSenha |
2024-04-22
⋅
HarfangLab
⋅
MuddyWater campaign abusing Atera Agents |
2024-04-16
⋅
HarfangLab
⋅
Analysis of the APT31 Indictment RAWDOOR APT31 |
2024-03-01
⋅
HarfangLab
⋅
A Comprehensive Analysis of i-SOON’s Commercial Offering ShadowPad Winnti |
2024-01-29
⋅
HarfangLab
⋅
Compromised Routers Are Still Leveraged as Malicious Infrastructure to Target Government Organizations in Europe and the Caucasus MASEPIE OCEANMAP |