Click here to download all references as Bib-File.
2023-05-26 ⋅ 0xToxin Labs ⋅ Kraken - The Deep Sea Lurker Part 2 KrakenKeylogger |
2023-05-25 ⋅ Mandiant ⋅ COSMICENERGY: New OT Malware Possibly Related To Russian Emergency Response Exercises LIGHTWORK PIEHOP |
2023-05-24 ⋅ BushidoToken Blog ⋅ Unmasking Ransomware Using Stylometric Analysis: Shadow, 8BASE, Rancoz |
2023-05-24 ⋅ Secureworks ⋅ Chinese Cyberespionage Group BRONZE SILHOUETTE Targets U.S. Government and Defense Organizations |
2023-05-24 ⋅ Microsoft ⋅ Volt Typhoon targets US critical infrastructure with living-off-the-land techniques |
2023-05-24 ⋅ CISA ⋅ AA23-144a: People's Republic of China State-Sponsored Cyber Actor Living off the Land to Evade Detection |
2023-05-24 ⋅ Zscaler ⋅ Technical Analysis of Pikabot Pikabot |
2023-05-23 ⋅ Kaspersky Labs ⋅ Meet the GoldenJackal APT group. Don’t expect any howls Jackal |
2023-05-23 ⋅ ESET Research ⋅ Android app breaking bad: From legitimate screen recording to file exfiltration within a year |
2023-05-22 ⋅ kienmanowar Blog ⋅ [Case study] Decrypt strings using Dumpulator |
2023-05-22 ⋅ Check Point ⋅ Cloud-based Malware Delivery: The Evolution of GuLoader CloudEyE |
2023-05-22 ⋅ Cluster25 ⋅ Back in Black: BlackByte Ransomware returns with its New Technology (NT) version BlackByte |
2023-05-22 ⋅ Trend Micro ⋅ BlackCat Ransomware Deploys New Signed Kernel Driver BlackCat |
2023-05-22 ⋅ The DFIR Report ⋅ IcedID Macro Ends in Nokoyawa Ransomware IcedID Nokoyawa Ransomware |
2023-05-21 ⋅ Github (0xThiebaut) ⋅ PCAPeek IcedID QakBot |
2023-05-20 ⋅ Kraken - The Deep Sea Lurker Part 1 KrakenKeylogger |
2023-05-19 ⋅ Twitter (@embee_research) ⋅ Analysis of Amadey Bot Infrastructure Using Shodan Amadey |
2023-05-19 ⋅ cocomelonc ⋅ Malware source code investigation: AsyncRAT AsyncRAT |
2023-05-18 ⋅ Intezer ⋅ How Hackers Use Binary Padding to Outsmart Sandboxes and Infiltrate Your Systems Emotet |
2023-05-18 ⋅ Twitter (@embee_research) ⋅ Identifying Laplas Infrastructure Using Shodan and Censys LaplasClipper |