Click here to download all references as Bib-File.•
2024-09-18
⋅
People’s Republic of China-Linked Actors Compromise Routers and IoT Devices for Botnet Operations Nosedive |
2023-04-28
⋅
WithSecure
⋅
Unleashing the Power of Shimcache with Chainsaw |
2023-04-18
⋅
NCSC UK
⋅
APT28 exploits known vulnerability to carry out reconnaissance and deploy malware on Cisco routers |
2023-02-09
⋅
#StopRansomware: Ransomware Attacks on Critical Infrastructure Fund DPRK Malicious Cyber Activities Dtrack MagicRAT Maui Ransomware SiennaBlue SiennaPurple Tiger RAT YamaBot |
2022-10-31
⋅
Twitter (@CryptoInsane)
⋅
Tweet about Yanluowang Leaks Yanluowang |
2022-10-06
⋅
CISA
⋅
Alert (AA22-279A) Top CVEs Actively Exploited By People’s Republic of China State-Sponsored Cyber Actors |
2022-09-22
⋅
CISA
⋅
Alert (AA22-265A) Control System Defense: Know the Opponent |
2022-09-14
⋅
CISA
⋅
Alert (AA22-257A): Iranian Islamic Revolutionary Guard Corps-Affiliated Cyber Actors Exploiting Vulnerabilities for Data Extortion and Disk Encryption for Ransom Operations |
2022-08-05
⋅
⋅
360 netlab
⋅
The DGA family Orchard continues to change, and the new version generates DGA domain names using Bitcoin transaction information Orchard |
2022-08-05
⋅
360 netlab
⋅
A new botnet Orchard Generates DGA Domains with Bitcoin Transaction Information Orchard |
2022-07-14
⋅
⋅
Cert-UA
⋅
UAC-0100 - Online fraud using the subject of "monetary compensation" (CERT-UA#4964) |
2022-04-27
⋅
CISA
⋅
Alert (AA22-117A) 2021 Top Routinely Exploited Vulnerabilities |
2022-04-26
⋅
cocomelonc
⋅
Malware development: persistence - part 2. Screensaver hijack. C++ example. Gazer |
2022-04-20
⋅
CISA
⋅
AA22-110A Joint CSA: Russian State-Sponsored and Criminal Cyber Threats to Critical Infrastructure VPNFilter BlackEnergy DanaBot DoppelDridex Emotet EternalPetya GoldMax Industroyer Sality SmokeLoader TrickBot Triton Zloader |
2022-04-13
⋅
APT Cyber Tools Targeting ICS/SCADA Devices |
2022-03-22
⋅
⋅
360 Threat Intelligence Center
⋅
Quantum Attack System – NSA "APT-C-40" Hacking Organization High-end Cyber Attack Weapon Technical Analysis Report (I) |
2022-03-03
⋅
NSA
⋅
Network Infrastructure Security Guidance |
2022-02-24
⋅
Iranian Government-Sponsored Actors Conduct Cyber Operations Against Global Government and Commercial Networks POWERSTATS PowGoop GRAMDOOR MoriAgent |
2022-02-23
⋅
Pangu Lab
⋅
The Bvp47 - a Top-tier Backdoor of US NSA Equation Group Bvp47 |
2022-02-23
⋅
Bleeping Computer
⋅
NSA-linked Bvp47 Linux backdoor widely undetected for 10 years Bvp47 |