Click here to download all references as Bib-File.•
2024-07-25
⋅
Symantec
⋅
Growing Number of Threats Leveraging AI Broomstick DBatLoader NetSupportManager RAT Rhadamanthys |
2024-07-24
⋅
Google
⋅
APT45: North Korea’s Digital Military Machine SHATTEREDGLASS |
2024-07-24
⋅
SOC Prime
⋅
UAC-0063 Attack Detection: Hackers Target Ukrainian Research Institutions Using HATVIBE, CHERRYSPY, and CVE-2024-23692 UAC-0063 |
2024-07-24
⋅
ThreatDown
⋅
Rhysida using Oyster Backdoor to deliver ransomware Broomstick Rhysida |
2024-07-23
⋅
Hunt.io
⋅
A Simple Approach to Discovering Oyster Backdoor Infrastructure Broomstick |
2024-07-23
⋅
K7 Security
⋅
Threat actors target recent Election Results Crimson RAT |
2024-07-22
⋅
Censys
⋅
A Beginner’s Guide to Hunting Malicious Open Directories Cobalt Strike Lumma Stealer Vidar |
2024-07-16
⋅
Recorded Future
⋅
TAG-100 Uses Open-Source Tools in Suspected Global Espionage Campaign, Compromising Two Asia-Pacific Intergovernmental Bodies Cobalt Strike |
2024-07-16
⋅
Sentinel LABS
⋅
NullBulge | Threat Actor Masquerades as Hacktivist Group Rebelling Against AI AsyncRAT LockBit XWorm Nullbulge |
2024-07-16
⋅
JPCERT/CC
⋅
MirrorFace Attack against Japanese Organisations LODEINFO NOOPDOOR |
2024-07-15
⋅
Trendmicro
⋅
CVE-2024-38112: Void Banshee Targets Windows Users Through Zombie Internet Explorer in Zero-Day Attacks Void Banshee |
2024-07-15
⋅
Trend Micro
⋅
CVE-2024-38112: Void Banshee Targets Windows Users Through Zombie Internet Explorer in Zero-Day Attacks |
2024-07-14
⋅
Phylum
⋅
Fake AWS Packages Ship Command and Control Malware In JPEG Files |
2024-07-14
⋅
Medium b.magnezi
⋅
Malware Analysis - Rhadamanthys Rhadamanthys |
2024-07-13
⋅
cocomelonc
⋅
Malware development: persistence - part 25. Create symlink from legit to evil. Simple C example. |
2024-07-11
⋅
Zscaler
⋅
MoonWalk: A deep dive into the updated arsenal of APT41 | Part 2 |
2024-07-11
⋅
sysdig
⋅
CRYSTALRAY: Inside the Operations of a Rising Threat Actor Exploiting OSS Tools CRYSTALRAY |
2024-07-11
⋅
McAfee
⋅
ClickFix Deception: A Social Engineering Tactic to Deploy Malware DarkGate Lumma Stealer |
2024-07-11
⋅
NCSC Switzerland
⋅
Brief technical analysis of the "Poseidon Stealer" malware Poseidon Stealer |
2024-07-10
⋅
Risky.biz
⋅
Risky Biz News: US takes down RT's Twitter bot farm Lifting Zmiy |