1. |
Amatas |
Cyber Threat Report - April 2023 |
2. |
AT&T |
2023 AT&T Cybersecurity Insights Report: Edge Ecosystem |
3. |
AttackIQ |
Emulating Recent Malicious Activity from the Iranian Adversary OilRig |
4. |
Barracuda |
Cybersecurity Threat Advisory: LastPass’ security incident update |
5. |
Barracuda |
Cybersecurity Threat Advisory: NortonLifeLock compromised |
6. |
Barracuda |
Cybersecurity Threat Advisory: Atlassian critical remote code execution vulnerability |
7. |
Barracuda |
Cybersecurity Threat Advisory: OneNote malware delivery |
8. |
Barracuda |
Cybersecurity Threat Advisory: Malicious packages found in Python Package Index (PyPI) |
9. |
Barracuda |
Cybersecurity Threat Advisory: New phishing campaigns related to recent bank failures |
10. |
Barracuda |
Cybersecurity Threat Advisory: Microsoft Outlook elevation of privilege vulnerability |
11. |
Barracuda |
Cybersecurity Threat Advisory: 3CX supply chain attack updates |
12. |
Barracuda |
Cybersecurity Threat Advisory: New QBot malware delivering campaigns discovered |
13. |
Barracuda |
Cybersecurity Threat Advisory: EvilExtractor malware surge detected |
14. |
Barracuda |
Threat Spotlight: Proportion of malicious HTML attachments doubles within a year |
15. |
Check Point |
Fake Websites Impersonating Association To ChatGPT Poses High Risk, Warns Check Point Research |
16. |
Check Point |
The Dragon Who Sold His Camaro: Analyzing Custom Router Implant |
17. |
Checkmarx |
Software Supply Chain Security Threat Landscape - April 2023 Overview |
18. |
CISA (Cybersecurity & Infrastructure Security Agency, United States of America) |
#StopRansomware: BianLian Ransomware Group |
19. |
Cofense |
Summer-Time Scams: The Return of Vacation-Request Phishing Emails |
20. |
Cyber Rescue Alliance |
Breaches Anticipated in 2023 |
21. |
Datadog |
The OverlayFS vulnerability CVE-2023-0386: Overview, detection, and remediation |
22. |
Dragos |
Dragos Analyzes Russian Programs Threatening Critical Civilian Infrastructure |
23. |
Dragos |
Deep Dive Into PIPEDREAM’s OPC UA Module, MOUSEHOLE |
24. |
ESET |
APT Activity Report: Q4 2022 - Q1 2023: Lazarus Extends Targeting to All Major Desktop OSes |
25. |
EU CERT |
Threat Landscape Report 2023Q1 |
26. |
FBI (Federal Bureau of Investigation, United States of America), NSA (National Security Agency, United States of America), CISA (Cybersecurity & Infrastructure Security Agency, United States of America), CNMF (Cyber National Mission Force, United States of America), NCSC (National Cyber Security Centre, United Kingdom), CCCS (Canadian Centre for Cyber Security, Canada), CSE (Communications Security Establishment, Canada), ACSC (Australian Cyber Security Centre, Australia), NZ NCSC (New Zealand National Cyber Security Centre, New Zealand) |
Hunting Russian Intelligence “Snake” Malware (a Joint Cybersecurity Advisory) |
27. |
Fortinet |
2023 Cloud Security Report |
28. |
Group-IB |
You’ve been kept in the dark (web): exposing Qilin’s RaaS program |
29. |
Huntress |
AgentTesla - Full Loader Analysis - Resolving API Hashes Using Conditional Breakpoints |
30. |
IBM X-Force / Security Intelligence |
BlackCat (ALPHV) Ransomware Levels Up for Stealth, Speed and Exfiltration |
31. |
Jose Luis Sánchez Martínez |
Dissecting GobRAT behaviors - Linux malware |
32. |
KPMG |
Cyber Incidents and Intelligence: 2022 |
33. |
Loginsoft |
IcedID Malware: Traversing Through its Various Incarnations |
34. |
Loginsoft |
Taming the Storm: Understanding and Mitigating the Consequences of CVE-2023-27350 |
35. |
Malwarebytes |
Fake system update drops Aurora stealer via Invalid Printer loader |
36. |
Meta |
Quarterly Adversarial Threat Report |
37. |
Meta |
2023-05 malware iocs |
38. |
Meta |
The malware threat landscape: NodeStealer, DuckTail, and more |
39. |
Microsoft (Microsoft Threat Intelligence) |
Iran turning to cyber-enabled influence operations for greater effect |
40. |
Microsoft (Microsoft Threat Intelligence) |
Volt Typhoon targets US critical infrastructure with living-off-the-land techniques |
41. |
Palo Alto / Unit42 |
Threat Assessment: Royal Ransomware |
42. |
Palo Alto / Unit42 |
Chinese Alloy Taurus Updates PingPull Malware |
43. |
Perception Point |
2023 Annual Report:Cybersecurity Trends & Insights |
44. |
Picnic |
Picnic Target Intelligence Report: Mailchimp |
45. |
Picnic |
Kodi February 2023 Data Breach |
46. |
Picnic |
Picnic Target Intelligence Report: Uber |
47. |
Picnic |
Activision Dec 2022 Social Engineering Attack and Data Breach |
48. |
Proofpoint |
2023 State of the Phish |
49. |
SentinelLabs / SentinelOne |
Kimsuky - Ongoing Campaign Using Tailored Reconnaissance Toolkit |
50. |
Synopsis |
Software Vulnerability Snapshot |
51. |
Talos / Ciscos |
New phishing-as-a-service tool “Greatness” already seen in the wild |
52. |
The DFIR Report |
IcedID Macro Ends in Nokoyawa Ransomware |
53. |
Trend Micro |
Rapture, a Ransomware Family With Similarities to Paradise |
54. |
Trend Micro |
Attack on Security Titans: Earth Longzhi Returns With New Tricks |
55. |
Trend Micro |
Rethinking Tactics: Annual Cybersecurity Roundup 2022 |
56. |
Trend Micro |
Update Now: PaperCut Vulnerability CVE-2023-27350 Under Active Exploitation |
57. |
Trend Micro |
Email Threat Landscape Report: Cybercriminal Tactics, Techniques That Organizations Need to Know |