1. |
Adam Chester |
PNG Steganography from First Principles |
2. |
adlumin |
PlayCrypt Ransomware Group Wreaks Havoc in Campaign Against Managed Service Providers |
3. |
Akamai |
Xurum: New Magento Campaign Discovered |
4. |
amatas |
Cyber Threat Report: July 2023 |
5. |
Apple |
About the security content of iOS 16.6 and iPadOS 16.6 |
6. |
Aqua |
Kubernetes Exposed: One Yaml away from Disaster |
7. |
AT&T |
Mac systems turned into proxy exit nodes by AdLoad |
8. |
AttackIQ |
Emulating the Iranian State-Sponsored Adversary APT35 |
9. |
BlackBerry |
Cuba Ransomware Deploys New Tools: Targets Critical Infrastructure Sector in the U.S. and IT Integrator in Latin America |
10. |
BlackBerry |
Global Threat Intelligence Report: March 1 – May 31, 2023 |
11. |
Blockchain Threat Intelligence |
BlockThreat - Week 1, 2023 |
12. |
Blockchain Threat Intelligence |
BlockThreat - Week 2, 2023 |
13. |
Blockchain Threat Intelligence |
BlockThreat - Week 3, 2023 |
14. |
Blockchain Threat Intelligence |
BlockThreat - Week 4, 2023 |
15. |
Blockchain Threat Intelligence |
BlockThreat - Week 5, 2023 |
16. |
Blockchain Threat Intelligence |
BlockThreat - Week 6, 2023 |
17. |
Blockchain Threat Intelligence |
BlockThreat - Week 7, 2023 |
18. |
Blockchain Threat Intelligence |
BlockThreat - Week 8, 2023 |
19. |
Blockchain Threat Intelligence |
BlockThreat - Week 9, 2023 |
20. |
Blockchain Threat Intelligence |
BlockThreat - Week 10, 2023 |
21. |
Blockchain Threat Intelligence |
BlockThreat - Week 11, 2023 |
22. |
Blockchain Threat Intelligence |
BlockThreat - Week 12, 2023 |
23. |
Blockchain Threat Intelligence |
BlockThreat - Week 13, 2023 |
24. |
Blockchain Threat Intelligence |
BlockThreat - Week 14, 2023 |
25. |
Blockchain Threat Intelligence |
BlockThreat - Week 15, 2023 |
26. |
Blockchain Threat Intelligence |
BlockThreat - Week 16, 2023 |
27. |
Blockchain Threat Intelligence |
BlockThreat - Week 17, 2023 |
28. |
Blockchain Threat Intelligence |
BlockThreat - Week 18, 2023 |
29. |
Blockchain Threat Intelligence |
BlockThreat - Week 19, 2023 |
30. |
Blockchain Threat Intelligence |
BlockThreat - Week 20, 2023 |
31. |
Blockchain Threat Intelligence |
BlockThreat - Week 21, 2023 |
32. |
Blockchain Threat Intelligence |
BlockThreat - Week 22, 2023 |
33. |
Blockchain Threat Intelligence |
BlockThreat - Week 23, 2023 |
34. |
Blockchain Threat Intelligence |
BlockThreat - Week 24, 2023 |
35. |
Blockchain Threat Intelligence |
BlockThreat - Week 25, 2023 |
36. |
Blockchain Threat Intelligence |
BlockThreat - Week 26, 2023 |
37. |
Blockchain Threat Intelligence |
BlockThreat - Week 27, 2023 |
38. |
Blockchain Threat Intelligence |
BlockThreat - Week 28, 2023 |
39. |
Blockchain Threat Intelligence |
BlockThreat - Week 29, 2023 |
40. |
Blockchain Threat Intelligence |
BlockThreat - Week 30, 2023 |
41. |
Blockchain Threat Intelligence |
BlockThreat - Week 31, 2023 |
42. |
Blockchain Threat Intelligence |
BlockThreat - Week 32, 2023 |
43. |
Blockchain Threat Intelligence |
BlockThreat - Week 33, 2023 |
44. |
bugcrowd |
Inside the Mind of a Hacker: 2023 Edition |
45. |
Bundesamt für Verfassungsschutz (Germany) |
BfV Cyber-Brief Nr. 01/2023 |
46. |
CBS (Centraal Bureau voor de Statistiek, the Netherlands - Dutch Only) |
Cybersecuritymonitor 2022 (Dutch only) |
47. |
CERT-EU |
2023 Q2 Threat Landscape Report |
48. |
ChainAnalysis |
2023 Crypto Crime Report |
49. |
Check Point |
Chinese Treat Actors Targeting Europe in SmugX Campaign |
50. |
Check Point |
Is Your Peloton Attracting Security Threats? |
51. |
Checkmarx |
First Known Targeted OSS Supply Chain Attacks Against the Banking Sector |
52. |
Checkmarx |
Lazarus Group Launches First Open Source Supply Chain Attacks Targeting Crypto Sector |
53. |
Checkmarx |
Manifest Confusion: Don’t Believe What You See; How Attackers Can Trick Developers |
54. |
Checkmarx |
Popular NuGet Package “Moq” Silently Exfiltrates User Data to Cloud Service |
55. |
Checkmarx |
Software Supply Chain Security Threat Landscape: July 2023 Overview |
56. |
CISA (Cybersecurity & Infrastructure Security Agency, the United States of America), FBI (Federal Bureau of Investigation, the United States of America), ACSC (Australian Cyber Security Centre, Australia), CCCS (Canadian Centre for Cyber Security, Canada), NZ-NCSC (New Zealand National Cyber Security Centre), CERT-NZ (Computer Emergency Response Team New Zealand), NCSC-UK (National Cyber Security Centre, United Kingdom) |
2022 Top Routinely Exploited Vulnerabilities |
57. |
CISA (Cybersecurity & Infrastructure Security Agency, the United States of America) |
Ivanti Releases Security Updates for Endpoint Manager Mobile (EPMM) CVE-2023-35078 |
58. |
CISA (Cybersecurity & Infrastructure Security Agency, the United States of America) |
MAR-10454006-r1.v2 SUBMARINE Backdoor |
59. |
CISA (Cybersecurity & Infrastructure Security Agency, the United States of America) |
MAR-10454006.r4.v2 SEASPY and WHIRLPOOL Backdoors |
60. |
CISA (Cybersecurity & Infrastructure Security Agency, the United States of America), FBI (Federal Bureau of Investigation, the United States of America) |
Identification and Disruption of QakBot Infrastructure |
61. |
Cofense |
Major Energy Company Targeted in Large QR Code Campaign |
62. |
Corero Network Security |
Mirai and its Common Attack Methods |
63. |
Critical Insight |
2023 H1 Healthcare Data Breach Report |
64. |
CrowdStrike |
2023 Threat Hunting Report |
65. |
Cyberint |
LinkedIn Accounts Under Attack |
66. |
Cycode |
VS Code’s Token Security: Keeping Your Secrets… Not So Secretly |
67. |
Cycognito |
State of External Exposure Management Report |
68. |
David G. |
Awesome Threat Intel Feeds |
69. |
DHS (Department of Homeland Security United States of America) |
Review Of The Attacks Associated with Lapsus$ And Related Threat Groups Report |
70. |
Dig Security |
The State of Cloud Data Security in 2023 |
71. |
Dragos |
2022 ICS/OT Cybersecurity Year in Review - FOCUS on Europe |
72. |
ESET |
MoustachedBouncer: Espionage against foreign diplomats in Belarus |
73. |
ESET |
Scarabs colon-izing vulnerable servers |
74. |
ESET |
Threat Report H1 2023 |
75. |
ExtraHop |
The True Cost of a Security Breach |
76. |
Fortinet |
Attackers Distribute Malware via Freeze.rs And SYK Crypter |
77. |
Fox IT |
Approximately 2000 Citrix NetScalers backdoored in mass-exploitation campaign |
78. |
GitHub |
Security alert: social engineering campaign targets technology industry employees |
79. |
Google (Google Cybersecurity Action Team (GCAT)) |
August 2023 Threat Horizons Report |
80. |
Group-IB |
Group-IB supports international police operation targeting 16shop, a popular phishing-as-a-service platform |
81. |
Group-IB |
Traders’ Dollars in Danger: CVE-2023-38831 zero-Day vulnerability in WinRAR exploited by cybercriminals to target traders |
82. |
Guardz |
The Massive macOS Threats Trending in the Dark Web |
83. |
GuidePoint |
Tunnel Vision: CloudflareD AbuseD in the WilD |
84. |
halcyon |
Report: Ransomware Command-and-Control Providers Unmasked by Halcyon Researchers |
85. |
HM Government (United Kingdom) |
National Risk Register 2023 |
86. |
HSCCC (Health Sector Cybersecurity Coordination Center United States of America) |
HC3: Sector Alert, Rhysida Ransomware |
87. |
Hudson Rock |
100,000 Hackers Exposed from Top Cybercrime Forums |
88. |
HYAS |
EyeSpy: Cognitive Threat Agent |
89. |
infosecn1nja |
Cyber Threat Intelligence |
90. |
Intel 471 |
The 471 Cyber Threat Report 2023-24 |
91. |
Intel471 |
Open Source Release of Intel 471 Intelligence Requirements Framework |
92. |
Interpol |
Cybercrime: 14 arrests, thousands of illicit cyber networks disrupted in Africa operation |
93. |
Interpol |
Suspected key figure of notorious cybercrime group arrested in joint operation |
94. |
Ivanti |
CVE-2023-38035 - Vulnerability affecting Ivanti Sentry |
95. |
Joshua Harrison, Ehsan Toreini, Maryam Mehrnezhad |
A Practical Deep Learning-Based Acoustic Side Channel Attack on Keyboards |
96. |
Kasada |
No Honour Amongst Thieves: Unpacking a New OpenBullet Malware Campaign |
97. |
Kaspersky |
APT trends report Q2 2023 |
98. |
Kaspersky |
Kaspersky uncovers malware for targeted data exfiltration from air-gapped environments |
99. |
Kaspersky |
New ransomware trends in 2023 |
100. |
Kaspersky |
Phishing with hacked sites |
101. |
KELA |
Ransomware Victims and Network Access Sales in Q1 2023 |
102. |
Kim Zetter |
Updates and Timeline for 3CX and X_Trader Hacks |
103. |
KnowBe4 |
2023 Phishing by Industry Benchmarking Report |
104. |
Kroll |
Deep Dive into GOOTLOADER Malware and Its Infection Chain |
105. |
Kroll |
Proof of Concept Developed for Ghostscript CVE-2023-36664 Code Execution Vulnerability |
106. |
Kroll |
Q2 2023 Threat Landscape Report: All Roads Lead to Supply Chain Infiltrations |
107. |
Malwarebytes |
Microsoft Teams used in phishing campaign to bypass multi-factor authentication |
108. |
Mandiant |
Better Together: The Benefits of Integrating Cyber Threat Intelligence and Risk Management |
109. |
Mandiant |
Pro-PRC HaiEnergy Campaign Exploits U.S. News Outlets via Newswire Services to Target U.S. Audiences; Evidence of Commissioned Protests in Washington, D.C. |
110. |
mend.io |
There’s a New Stealer Variant in Town, and It’s Using Electron to Stay Fully Undetected |
111. |
Microsoft (Microsoft Incident Response) |
The five-day job: A BlackByte ransomware intrusion case study |
112. |
Microsoft (Microsoft Threat Intelligence) |
Midnight Blizzard conducts targeted social engineering over Microsoft Teams |
113. |
Microsoft (Microsoft Threat Intelligence) |
Flax Typhoon using legitimate software to quietly access Taiwanese organizations |
114. |
Microsoft |
Microsoft Exchange Server Elevation of Privilege Vulnerability |
115. |
Microsoft |
Microsoft Office Defense in Depth Update: ADV230003 Security Advisory |
116. |
Midnight Blue |
TETRA:BURST |
117. |
Mnemonic |
Threat Advisory: Remote Code Execution (RCE) vulnerability in Ivanti Sentry (CVE-2023-38035) |
118. |
Natto Team |
China as a Target of Cyberattacks: What China Says About Who Are in Their Systems |
119. |
NCSC-NL (Nationaal Cyber Security Centrum, the Netherlands, Dutch only) |
TETRA-kwetsbaarheid en de rol van het NCSC bij CVD’s (Dutch only |
120. |
Netenrich |
Discovering the ADHUBLLKA Ransomware Family: Tracing the Roots of LOLKEK, BIT, OBZ, U2K, TZW Variants |
121. |
New York Times |
U.S. Hunts Chinese Malware That Could Disrupt American Military Operations |
122. |
Niels Groeneveld |
Badhood Analysis: A Comprehensive Framework for Identifying, Evaluating, and Neutralizing High-Risk Internet Subnets |
123. |
NIST (National Institute of Standards and Technology, United States of America) |
CVE-2023-26359 Detail |
124. |
ODNI (Office of the Director of National Intelligence United State of America) |
2023 National Intelligence Strategy |
125. |
OPSWAT |
2023 State of Web Application Security |
126. |
OPSWAT |
2023 Threat Intelligence Trends: Malware Analysis Survey Insights |
127. |
Palo Alto / Unit42 |
Ransomware Delivery URLs: Top Campaigns and Trends |
128. |
Palo Alto / Unit42 |
Threat Group Assessment: Mallox Ransomware |
129. |
Patrick Barker |
Dismantling Hermetic Wiper’s Little Brother: WhisperGate |
130. |
Pentera |
The LOL Isn’t So Funny When It Bites You in the BAS |
131. |
Picus |
July 2023: Key Threat Actors, Malware and Exploited Vulnerabilities |
132. |
Picus |
Picus Cyber Threat Intelligence Report June 2023: Key Threat Actors, Regions and Industries at Risk |
133. |
Picus |
Picus Cyber Threat Intelligence Report May 2023: Key Threat Actors, Vulnerable Regions, and Industries at Risk |
134. |
Picus |
Securing macOS: A Closer Look At Built-In macOS Application Security |
135. |
Picus |
The Blue Report 2023 |
136. |
Positive Technologies |
Space Pirates: a look into the group’s unconventional techniques, new attack vectors, and tools |
137. |
Pradeo |
Two spyware tied with China found hiding on the Google Play Store |
138. |
Progress |
MOVEit Transfer Service Pack (July 2023) |
139. |
Proofpoint |
Cloud Account Takeover Campaign Leveraging EvilProxy Targets Top-Level Executives at over 100 Global Organizations |
140. |
Qi AN Xin (奇安信)(QAX) |
2023 Mid-year Global APT Report (全球高级持续性威胁(APT)2023年中报告 |
141. |
QuoIntelligence |
Weekly Intelligence Snapshot – Week 01 |
142. |
QuoIntelligence |
Weekly Intelligence Snapshot – Week 02 |
143. |
QuoIntelligence |
Weekly Intelligence Snapshot – Week 03 |
144. |
QuoIntelligence |
Weekly Intelligence Snapshot – Week 04 |
145. |
QuoIntelligence |
Weekly Intelligence Snapshot – Week 05 |
146. |
QuoIntelligence |
Weekly Intelligence Snapshot – Week 06 |
147. |
QuoIntelligence |
Weekly Intelligence Snapshot – Week 07 |
148. |
QuoIntelligence |
Weekly Intelligence Snapshot – Week 08 |
149. |
QuoIntelligence |
Weekly Intelligence Snapshot – Week 09 |
150. |
QuoIntelligence |
Weekly Intelligence Snapshot – Week 10 |
151. |
QuoIntelligence |
Weekly Intelligence Snapshot – Week 11 |
152. |
QuoIntelligence |
Weekly Intelligence Snapshot – Week 12 |
153. |
QuoIntelligence |
Weekly Intelligence Snapshot – Week 13 |
154. |
QuoIntelligence |
Weekly Intelligence Snapshot – Week 14 |
155. |
QuoIntelligence |
Weekly Intelligence Snapshot – Week 15 |
156. |
QuoIntelligence |
Weekly Intelligence Snapshot – Week 16 |
157. |
QuoIntelligence |
Weekly Intelligence Snapshot – Week 17 |
158. |
QuoIntelligence |
Weekly Intelligence Snapshot – Week 18 |
159. |
QuoIntelligence |
Weekly Intelligence Snapshot – Week 19 |
160. |
QuoIntelligence |
Weekly Intelligence Snapshot – Week 20 |
161. |
QuoIntelligence |
Weekly Intelligence Snapshot – Week 21, 2023 |
162. |
QuoIntelligence |
Weekly Intelligence Snapshot – Week 22, 2023 |
163. |
QuoIntelligence |
Weekly Intelligence Snapshot – Week 23, 2023 |
164. |
QuoIntelligence |
Weekly Intelligence Snapshot – Week 24, 2023 |
165. |
QuoIntelligence |
Weekly Intelligence Snapshot – Week 25, 2023 |
166. |
QuoIntelligence |
Weekly Intelligence Snapshot – Week 26, 2023 |
167. |
QuoIntelligence |
Weekly Intelligence Snapshot – Week 27, 2023 |
168. |
QuoIntelligence |
Weekly Intelligence Snapshot – Week 28, 2023 |
169. |
QuoIntelligence |
Weekly Intelligence Snapshot – Week 29, 2023 |
170. |
QuoIntelligence |
Weekly Intelligence Snapshot – Week 30, 2023 |
171. |
QuoIntelligence |
Weekly Intelligence Snapshot – Week 31, 2023 |
172. |
QuoIntelligence |
Weekly Intelligence Snapshot – Week 32, 2023 |
173. |
QuoIntelligence |
Weekly Intelligence Snapshot – Week 33, 2023 |
174. |
QuoIntelligence |
Weekly Intelligence Snapshot – Week 34, 2023 |
175. |
Ransomware.org |
The State of Ransomware 2023 |
176. |
Rapid7 |
Rapid7 2022 Vulnerability Intelligence Report |
177. |
Recorded Future / Insikt Group |
BlueBravo Adapts to Target Diplomatic Entities with GraphicalProton Malware |
178. |
Recorded Future / Insikt Group |
BlueCharlie, Previously Tracked as TAG-53, Continues to Deploy New Infrastructure in 2023 |
179. |
Recorded Future / Insikt Group |
H1 2023: Ransomware’s Pivot to Linux and Vulnerable Drivers |
180. |
Recorded Future / Insikt Group |
RedHotel: A Prolific, Chinese State-Sponsored Group Operating at a Global Scale |
181. |
Recorded Future / Insikt Group |
Threat Actors Leverage Internet Services to Enhance Data Theft and Weaken Security Defenses |
182. |
Red Canary |
Intelligence Insights: February 2023 |
183. |
Red Canary |
Intelligence Insights: March 2023 |
184. |
Red Canary |
Intelligence Insights: April 2023 |
185. |
Red Canary |
Intelligence Insights: May 2023 |
186. |
Red Canary |
Intelligence Insights: June 2023 |
187. |
Red Canary |
Intelligence Insights: July 2023 |
188. |
Red Canary |
Intelligence Insights: August 2023 |
189. |
Rezilion |
CVSS, EPSS, KEV: The New Acronyms - And The Intelligence - You Need For Effective Vulnerability Management |
190. |
Ruihan Li / Stanislav Ochotnický / Pumpkin |
StackRot (CVE-2023-3269): Linux kernel privilege escalation vulnerability |
191. |
RUSI (Royal United Services Institute, England) |
Cyber Insurance and the Ransomware Challenge |
192. |
SANS |
SANS 2023 Security Awareness Report: Managing Human Risk |
193. |
Sekoia.io |
CustomerLoader: a new malware distributing a wide variety of payloads |
194. |
SentinelOne |
Apple Crimeware: Massive Rust Infostealer Campaign Aiming for macOS Sonoma Ahead of Public Release |
195. |
SentinelOne |
XLoader’s Latest Trick: New macOS Variant Disguised as Signed OfficeNote App |
196. |
ShorSec |
DLL Notification Injection |
197. |
SlashNext |
AI-Based Cybercrime Tools WormGPT and FraudGPT Could Be The Tip of the Iceberg |
198. |
SOCRadar |
Dark Web Profile: Play Ransomware |
199. |
Sonar |
A Twist in the Code: OpenMeetings Vulnerabilities through Unexpected Application State |
200. |
Sophos |
Clustering attacker behavior reveals hidden patterns |
201. |
Sophos |
Into the tank with Nitrogen |
202. |
Spin.AI |
Browser Extension Risk Report: High Risks for SaaS Data |
203. |
Symantec |
Carderbee: APT Group use Legit Software in Supply Chain Attack Targeting Orgs in Hong Kong |
204. |
SynSaber |
ICS CVE Research:First Half of 2023 |
205. |
Sysdig |
LABRAT: Stealthy Cryptojacking and Proxyjacking Campaign Targeting GitLab |
206. |
Talos / Cisco |
Lazarus Group’s infrastructure reuse leads to discovery of new malware |
207. |
Team Cymru |
A Blog with NoName |
208. |
Team Cymru |
AllaKore(d) the SideCopy Train |
209. |
Team Cymru |
Darth Vidar: The Aesir Strike Back |
210. |
Team Cymru |
Darth Vidar: The Dark Side of Evolving Threat Infrastructure |
211. |
Team Cymru |
Inside the IcedID BackConnect Protocol (Part 2) |
212. |
Team Cymru |
Inside the IcedID BackConnect Protocol |
213. |
Team Cymru |
MoqHao Part 3: Recent Global Targeting Trends |
214. |
Team Cymru |
Visualizing Qakbot Infrastructure Part II: Uncharted Territory |
215. |
Team Cymru |
Visualizing QakBot Infrastructure |
216. |
Team Cymru |
Voice of a Threat Hunter Report |
217. |
The DFIR Report |
HTML Smuggling Leads to Domain Wide Ransomware |
218. |
ThreatMon |
Unmasking Stealer X1na A Technical Analysis of the Latest Threat (IOCs) |
219. |
ThreatMon |
Unmasking Stealer X1na: A Technical Analysis of the Latest Threat |
220. |
Trellix |
Scattered Spider: The Modus Operandi |
221. |
Trellix |
Uncover the Hidden Story of Ransomware Victims – They’re Not Who You Think |
222. |
Trend Micro |
Profile Stealers Spread via LLM-themed Facebook Ads |
223. |
Trend Micro |
Ransomware Spotlight: Play |
224. |
Trend Micro |
Related CherryBlos and FakeTrade Android Malware Involved in Scam Campaigns |
225. |
Trustwave |
Honeypot Recon: Enterprise Applications Honeypot - Unveiling Findings from Six Worldwide Locations |
226. |
Varonis |
What is IDOR (Insecure Direct Object Reference)? |
227. |
VulnCheck |
Exploiting MikroTik RouterOS Hardware with CVE-2023-30799 |
228. |
White Knight Labs |
Unleashing the Unseen: Harnessing the Power of Cobalt Strike Profiles for EDR Evasion |
229. |
Will Thomas |
Tracking Adversaries: Scattered Spider, the BlackCat affiliate |
230. |
WIRED |
How “Operation Cookie Monster” took down the world’s largest cybercriminal marketplace, Genesis |
231. |
Wiz |
2023 Cloud Security Threat Report |
232. |
World Economic Forum |
Chief Risk Officers Outlook: July 2023 |
233. |
ZDI (Zero Day Initiative) |
RARLAB WinRAR Recovery Volume Improper Validation of Array Index Remote Code Execution Vulnerability |
234. |
Zscaler |
Statc Stealer: Decoding the Elusive Malware Threat |