Click here to download all references as Bib-File.•
| 2025-03-31
            
            ⋅
            
            Wiz.io
            ⋅
            
             CPU_HU: Fileless cryptominer targeting exposed PostgreSQL with over 1.5K victims JINX-0126  | 
| 2022-01-11
            
            ⋅
            
            Intezer
            ⋅
            
             New SysJoker Backdoor Targets Windows, Linux, and macOS SysJoker SysJoker SysJoker  | 
| 2021-09-13
            
            ⋅
            
            Intezer
            ⋅
            
             Vermilion Strike: Linux and Windows Re-implementation of Cobalt Strike Vermilion Strike Vermilion Strike  | 
| 2021-07-14
            
            ⋅
            
            Intezer
            ⋅
            
             Targeted Phishing Attack against Ukrainian Government Expands to Georgia Unidentified 083 (AutoIT Stealer)  | 
| 2021-03-10
            
            ⋅
            
            Intezer
            ⋅
            
             New Linux Backdoor RedXOR Likely Operated by Chinese Nation-State Actor RedXOR XOR DDoS  | 
| 2021-02-17
            
            ⋅
            
            Intezer
            ⋅
            
             ELF Malware Analysis 101: Part 3 - Advanced Analysis Rekoobe  | 
| 2021-01-05
            
            ⋅
            
            Intezer
            ⋅
            
             Operation ElectroRAT: Attacker Creates Fake Companies to Drain Your Crypto Wallets ElectroRAT  | 
| 2020-12-29
            
            ⋅
            
            Intezer
            ⋅
            
             Early Bird Catches the Worm: New Golang Worm Drops XMRig Miner on Servers  | 
| 2020-11-24
            
            ⋅
            
            Intezer
            ⋅
            
             Stantinko’s Proxy After Your Apache Server Stantinko  | 
| 2020-10-01
            
            ⋅
            
            Intezer
            ⋅
            
             A Storm is Brewing: IPStorm Now Has Linux Malware IPStorm  | 
| 2020-08-19
            
            ⋅
            
            Intezer
            ⋅
            
             ELF Malware Analysis 101 Part 2: Initial Analysis  |