1 |
23andMe |
Addressing Data Security Concerns |
2 |
AhmedS Kasmani |
NjRat Malware Analysis |
3 |
AhnLab |
Infostealer with Abnormal Certificate Being Distributed |
4 |
AhnLab |
Kimsuky Threat Group Uses RDP to Control Infected Systems |
5 |
AhnLab |
ShellBot DDoS Malware Installed Through Hexadecimal Notation Addresses |
6 |
Akamai |
The Art of Concealment: A New Magecart Campaign That’s Abusing 404 Pages |
7 |
amatas |
Cyber Threat Report: September 2023 |
8 |
Amazon (AWS) |
How AWS threat intelligence deters threat actors |
9 |
ANY.RUN |
Analyzing Snake Keylogger in ANY.RUN: a Full Walkthrough |
10 |
approov |
Security Challenges of Financial Mobile Apps in Africa |
11 |
Assured Intelligence |
# CybersecurityAwarenessMonth: Cybersecurity Burnout: Cause, Impact and Resolution |
12 |
Atlassian |
CVE-2023-22515 - Broken Access Control Vulnerability in Confluence Data Center and Server |
13 |
Chainanalysis |
OFAC Sanctions Gaza-based MSB Buy Cash with Crypto Ties to Hamas Following Terror Attack Against Israel |
14 |
Check Point |
From Albania to the Middle East: The Scarred Manticore is Listening |
15 |
Check Point |
Phishing via Dropbox |
16 |
Check Point |
Unveiling ‘Stayin’ Alive’: A Closer Look at an Ongoing Campaign in Asia Targeting Telecom and Governmental Entities |
17 |
Checkmarx |
September 2023 in Software Supply Chain Security |
18 |
Checkmarx |
The evolutionary tale of a persistent Python threat |
19 |
CISA (Cybersecurity & Infrastructure Security Agency, the United States of America), FBI (Federal Bureau of Investigation, the United States of America) |
# StopRansomware: AvosLocker Ransomware (Update) |
20 |
CISA (Cybersecurity & Infrastructure Security Agency, the United States of America) |
# StopRansomware: AvosLocker Ransomware (Update) |
21 |
Cisco / Talos |
Arid Viper disguising mobile spyware as updates for non-malicious Android applications |
22 |
Cisco / Talos |
Talos uncovers espionage campaigns targeting CIS countries, embassies and EU health care agency |
23 |
Cisco |
Cisco IOS XE Software Web UI Privilege Escalation Vulnerability |
24 |
Cloudflare |
HTTP/2 Zero-Day vulnerability results in record-breaking DDoS attacks |
25 |
Cloudflare |
Malicious “RedAlert - Rocket Alerts” Application Targets Israeli Phone Calls, SMS, and User Information |
26 |
Communications Authority of Kenya |
31st Cybersecurity Report |
27 |
Corvus |
Q3 Ransomware Report: Global Ransomware Attacks Up More Than 95% Over 2022 |
28 |
Corvus |
While Leaves Fall, Ransomware Rises: Attacks Are Up 5.1% in September |
29 |
Cyberknow |
Israel-Palestine CyberTracker - 9 OCT 2023 |
30 |
Cyentia |
IRIS Risk Retia: Threat Event Analysis |
31 |
Daniel Stenberg |
How I Made a Heap Overflow in CURL |
32 |
DarkOwl |
23andMe Suffers Data Breach |
33 |
D-Link |
(Non-US) D-Link Corporation Provides Details about an Information Disclosure Security Incident |
34 |
DoD (Department of Defense, the United States of America) |
DOD Releases 2023 Report on Military and Security Developments Involving the People’s Republic of China |
35 |
EclecticIQ |
Chinese State-Sponsored Cyber Espionage Activity Targeting Semiconductor Industry in East Asia |
36 |
Elastic |
2023 Elastic Global Threat Report |
37 |
Embee Research |
Introduction to DotNet Configuration Extraction - RevengeRAT |
38 |
ENISA |
ENISA Threat Landscape 2023 |
39 |
ESET |
Operation Jacana: Foundling hobbits in Guyana |
40 |
ESET |
Winter Vivern exploits zero-day vulnerability in Roundcube Webmail servers |
41 |
EU CERT |
Threat Landscape Report 2023Q3 |
42 |
FBI (Federal Bureau of Investigation, the United States of America) |
Two or More Ransomware Variants Impacting the Same Victims and Data Destruction Trends |
43 |
Field Effect |
New vulnerability in Atlassian Confluence could result in significant data loss |
44 |
Fortinet |
Another InfoStealer Enters the Field, ExelaStealer |
45 |
Fortinet |
IZ1H9 Campaign Enhances Its Arsenal with Scores of Exploits |
46 |
Fortinet |
Threat Actors Exploit the Tensions Between Azerbaijan and Armenia |
47 |
Google (GTAG (Google Threat Analysis Group)) |
0-days exploited by commercial surveillance vendor in Egypt |
48 |
Google (GTAG (Google Threat Analysis Group)) |
Government-backed actors exploiting WinRAR vulnerability |
49 |
Google |
How it works: The novel HTTP/2 ‘Rapid Reset’ DDoS attack |
50 |
Group-IB |
Analyzing cyber activity surrounding the conflict in the Middle East |
51 |
Group-IB |
GoldDigger drains your bank account: new Trojan uncovered by Group-IB targets 50+ Vietnamese banks |
52 |
Group-IB |
Let’s dig deeper: dissecting the new Android Trojan GoldDigger with Group-IB Fraud Matrix |
53 |
Group-IB |
The untold story of incident response: Insider’s Gambit |
54 |
Guardio |
“EtherHiding” — Hiding Web2 Malicious Code in Web3 Smart Contracts |
55 |
HP Wolf Security |
HP Wolf Security Threat Insights Report Q3 2023 |
56 |
HUMAN Security |
HUMAN Disrupts Digital Supply Chain Threat Actor Scheme Originating from China |
57 |
IBM (X-Force) |
X-Force uncovers global NetScaler Gateway credential harvesting campaign |
58 |
Imperva |
2023 Cyberthreat Defense Report |
59 |
Imperva |
2023 Imperva Bad Bot Report |
60 |
Infoblox |
Prolific Puma: Shadowy Link Shortening Service Enables Cybercrime |
61 |
Intel471 |
Managed File Transfer Software: Assessing the Risks |
62 |
Intrinsec Security |
Cybercrime Threat Landscape August 2023 |
63 |
Intrinsec Security |
Cybercrime Threat Landscape July 2023 |
64 |
Intrinsec Security |
Lumma Stealer actively deployed in multiple campaigns |
65 |
Intrinsec Security |
Ongoing threats targeting the energy industry |
66 |
ISF (Information Security Forum) |
Threat Horizon 2025: Scenarios for an Uncertain Future (Member Only) |
67 |
Julian B. |
Israel - Gaza Strip Conflict Cyber Attack Timeline |
68 |
Kaspersky |
H1 2023 - A Brief Overview of Main Incidents in Industrial Cybersecurity |
69 |
Kaspersky |
Stealer for PIX payment system, new Lumar stealer and Rhysida ransomware |
70 |
Kaspersky |
StripedFly: Perennially flying under the radar |
71 |
Kelvin W. |
GuLoader Malware Analysis: Noob Edition |
72 |
KPMG |
KPMG 2023 CEO Outlook |
73 |
Kyndryl |
What IT Decision Makers Say About the State of IT Risk |
74 |
Maltego |
Top 36 Threat Intelligence Providers for SOC Teams |
75 |
Malwarebytes |
Everyone’s Afraid of the Internet |
76 |
Malwarebytes |
Malvertising via Dynamic Search Ads delivers malware bonanza |
77 |
Mandiant |
Assessed Cyber Structure and Alignments of North Korea in 2023 |
78 |
Mandiant |
Investigation of Session Hijacking via Citrix NetScaler ADC and Gateway Vulnerability (CVE-2023-4966) |
79 |
Microsoft (Microsoft Security) |
The State of Cybercrime (2023) |
80 |
Microsoft (Microsoft Threat Intelligence) |
Automatic disruption of human-operated attacks through containment of compromised user accounts |
81 |
Microsoft (Microsoft Threat Intelligence) |
Multiple North Korean threat actors exploiting the TeamCity CVE-2023-42793 vulnerability |
82 |
Microsoft (Microsoft Threat Intelligence) |
Octo Tempest crosses boundaries to facilitate extortion, encryption, and destruction |
83 |
Microsoft |
Microsoft WordPad Information Disclosure Vulnerability: CVE-2023-36563 Security Vulnerability |
84 |
MS-ISAC (Multi-State Information Sharing and Analysis Center, the United States of America), CISA (Cybersecurity & Infrastructure Security Agency, the United States of America), FBI (Federal Bureau of Investigation, the United States of America) |
Threat Actors Exploit Atlassian Confluence CVE-2023-22515 for Initial Access to Networks |
85 |
National Cybersecurity Alliance |
Oh Behave! The Annual Cybersecurity Attitudes and Behaviors Report 2023 |
86 |
Natto Team |
China Joins the Name-and-Shame Game |
87 |
NIST (National Institute of Standards and Technology, United States of America) |
CVE-2023-40044 Detail |
88 |
NSA (National Security Agency, the United States of America) |
NSA releases a repository of signatures and analytics to secure Operational Technology |
89 |
Oligo |
ShellTorch: Multiple Critical Vulnerabilities in PyTorch Model Server (TorchServe) (CVSS 9.9, CVSS 9.8) Threatens Countless AI Users - Immediate Action Required |
90 |
Palo Alto / Unit42 |
2023-10-17 (TUESDAY) - TA577 PIKABOT INFECTION WITH COBALT STRIKE |
91 |
Palo Alto / Unit42 |
BlackCat Climbs the Summit With a New Tactic |
92 |
Palo Alto / Unit42 |
Unit 42 Attack Surface Threat Report |
93 |
Phylum |
Phylum Discovers SeroXen RAT in Typosquatted NuGet Package |
94 |
Pinpoint |
Cyber Security Vendor Funding Report – Q1, 2023 |
95 |
Pinpoint |
Cyber Security Vendor Funding Report – Q3, 2023 |
96 |
Pinpont |
Cyber Security Vendor Funding Report – Q2, 2023 |
97 |
Positive Technologies |
GCC data in demand on the cybercriminal services market |
98 |
Proofpoint |
Are You Sure Your Browser is Up to Date? The Current Landscape of Fake Browser Updates |
99 |
Proofpoint |
From Copacabana to Barcelona: The Cross-Continental Threat of Brazilian Banking Malware |
100 |
Proofpoint |
Security Brief: TA571 Delivers IcedID Forked Loader |
101 |
Pulsedive |
Analyzing Agniane Stealer |
102 |
PWC |
Yellow Liderc ships its scripts and delivers IMAPLoader malware |
103 |
Qualys |
CVE-2023-4911: Looney Tunables – Local Privilege Escalation in the glibc’s ld.so |
104 |
QuoIntelligence |
Hamas–Israel Crisis: Impact on Geopolitics and Cyber Threat Landscape for the European Energy Sector |
105 |
Recorded Future (Insikt Group) |
Near-Space in China’s Military Strategy: Strategic Reconnaissance, Precision Strike, and Battlefield Advantage |
106 |
Recorded Future |
Recorded Future CVE Monthly April 2023 |
107 |
Recorded Future |
Recorded Future CVE Monthly August 2023 |
108 |
Recorded Future |
Recorded Future CVE Monthly February 2023 |
109 |
Recorded Future |
Recorded Future CVE Monthly January 2023 |
110 |
Recorded Future |
Recorded Future CVE Monthly July 2023 |
111 |
Recorded Future |
Recorded Future CVE Monthly June 2023 |
112 |
Recorded Future |
Recorded Future CVE Monthly March 2023 |
113 |
Recorded Future |
Recorded Future CVE Monthly May 2023 |
114 |
Recorded Future |
Recorded Future CVE Monthly September 2023 |
115 |
ReliaQuest |
The Israel–Hamas Conflict: Implications for the Cyber Threat Landscape |
116 |
Rezilion |
The CVE-2023-5217 Deja Vu – Another Actively Exploited Chrome Vulnerability Affecting a WebM Project Library (libvpx) |
117 |
SailPoint |
Horizons of Identity Security ,2023-24 |
118 |
Secureworks |
2023 State of the Threat: A Year in Review |
119 |
Security Lab Amnesty International |
Global: ‘Predator Files’ investigation reveals catastrophic failure to regulate surveillance trade |
120 |
Security Lab Amnesty International |
Predator Files: Technical deep-dive into Intellexa Alliance’s surveillance products |
121 |
SecurityScoreCard |
Cyber Risk Intelligence Update: Hacktivist Involvement in Israel-Hamas War Reflects Possible Shift in Threat Actor Focus |
122 |
SecurityScoreCard |
Cyber Risk Intelligence: Cyber Activity, Israeli Industrial Control Systems, and the Israel-Hamas War |
123 |
Sekoia.io |
Active Lycantrox Infrastructure Illumination |
124 |
Sekoia.io |
AridViper, an intrusion set allegedly associated with Hamas |
125 |
SOCRadar |
BRAZIL THREAT LANDSCAPE REPORT: “Unmasking Stealer Malware Dominance in Brazil” |
126 |
SOCRadar |
GhostLocker: A New Generation of Ransomware as a Service (RaaS) |
127 |
SOCRadar |
Threat Actor Profile: SiegedSec |
128 |
Splunk |
Mockbin and the Art of Deception: Tracing Adversaries, Going Headless and Mocking APIs |
129 |
SpyCloud |
2023 Annual Identity Exposure Report |
130 |
SumSub |
State of Verificationand Monitoring inthe Crypto Industry |
131 |
The DFIR Report |
NetSupport Intrusion Results in Domain Compromise |
132 |
The DFIR Spot |
Artifacts of Execution: Prefetch - Part One |
133 |
The Verge |
Hackers are selling the data of millions lifted from 23andMe’s genetic database |
134 |
ThreatMon |
Malware Under the Radar: September Insights and Darkweb Discoveries |
135 |
ThreatMon |
Navigating the Digital Frontier: Cyber Threats in the Israeli-Palestinian War |
136 |
ThreatMon |
Riddle Unveiled: New Evasive Stealer Malware from the Underground |
137 |
ThreatMon |
Serpent Stealer Unmasked: Threat Analysis and Countermeasures |
138 |
Tines |
2023 Voice of the SOC |
139 |
Trellix |
Discord, I Want to Play a Game |
140 |
Trellix |
Rhysida Ransomware |
141 |
Trellix |
Trellix 2024 Threat Predictions |
142 |
Trend Micro |
APT34 Deploys Phishing Attack With New Malware |
143 |
Trend Micro |
DarkGate Opens Organizations for Attack via Skype, Teams |
144 |
Trend Micro |
Void Rabisu Targets Female Political Leaders with New Slimmed-Down ROMCOM Variant |
145 |
Upstream |
H1’2023 Automotive Cyber Trend Report |
146 |
Uptycs |
QuasarRAT sideloading execution: a closer look at the technique |
147 |
VMware |
VMSA-2023-0023 |
148 |
WatchGuard |
Internet Security Report - Q1 2023 |
149 |
WatchGuard |
Internet Security Report - Q2 2023 |
150 |
Wordfence |
Backdoor Masquerading as Legitimate Plugin |
151 |
Zscaler |
BunnyLoader, the newest Malware-as-a-Service |