Click here to download all references as Bib-File.•
2024-12-05
⋅
Orange Cyberdefense
⋅
Edam Dropper Edam Emmenhtal |
2024-12-04
⋅
Cleafy
⋅
DroidBot: Insights from a new Turkish MaaS fraud operation DroidBot |
2024-12-03
⋅
Check Point Research
⋅
Inside Akira Ransomware’s Rust Experiment Akira |
2024-12-03
⋅
BitSight
⋅
PROXY.AM Powered by Socks5Systemz Botnet Socks5 Systemz |
2024-12-02
⋅
Zscaler
⋅
Unveiling RevC2 and Venom Loader RevC2 VenomLoader |
2024-11-30
⋅
Technical Evolution
⋅
REKOOBE APT-31 Linux Backdoor Analysis Rekoobe |
2024-11-28
⋅
StrikeReady
⋅
RU APT targeting Energy Infrastructure (Unknown unknowns, part 3) Edam Emmenhtal |
2024-11-26
⋅
Security Affairs
⋅
The source code of Banshee Stealer leaked online BANSHEE |
2024-11-25
⋅
LinkedIn (Idan Tarab)
⋅
The IT Army of Ukraine: Cyber Resistance in the Digital Battlefield |
2024-11-22
⋅
Medium (@lcam)
⋅
How to target European SME with Ransomware? Through Zyxel! HellDown Babuk |
2024-11-22
⋅
Volexity
⋅
The Nearest Neighbor Attack: How A Russian APT Weaponized Nearby Wi-Fi Networks for Covert Access |
2024-11-21
⋅
ESET Research
⋅
Unveiling WolfsBane: Gelsemium’s Linux counterpart to Gelsevirine FireWood WolfsBane Icesword |
2024-11-21
⋅
Intrinsec
⋅
PROSPERO & Proton66: Uncovering the links between bulletproof networks Coper SpyNote FAKEUPDATES GootLoader EugenLoader |
2024-11-20
⋅
Orange Cyberdefense
⋅
The hidden network: How China unites state, corporate, and academic assets for cyber offensive campaigns |
2024-11-20
⋅
Trellix
⋅
Phobos: Stealthy Ransomware That Operated Under the Radar - Until Now 8Base CryptXXXX Dharma Phobos |
2024-11-20
⋅
Intrinsec
⋅
PROSPERO & Proton66: Tracing Uncovering the links between bulletproof networks Coper SpyNote FAKEUPDATES GootLoader EugenLoader IcedID Matanbuchus Nokoyawa Ransomware Pikabot |
2024-11-19
⋅
Hunt.io
⋅
XenoRAT Adopts Excel XLL Files and ConfuserEx as Access Method XenoRAT |
2024-11-18
⋅
Trend Micro
⋅
Inside Water Barghest’s Rapid Exploit-to-Market Strategy for IoT Devices Ngioweb |
2024-11-18
⋅
Trend Micro
⋅
Inside Water Barghest’s Rapid Exploit-to-Market Strategy for IoT Devices Ngioweb Water Barghest |
2024-11-18
⋅
Logpoint
⋅
Exploring Strela Stealer: Initial Payload Analysis and Insights StrelaStealer |