Click here to download all references as Bib-File.•
2023-01-01
⋅
ThreatMon
⋅
Solving the Puzzle: Reversing the New Stealer Jigsaw Jigsaw |
2023-01-01
⋅
ThreatMon
⋅
Unmasking Stealer X1na: A Technical Analysis of the Latest Threat |
2023-01-01
⋅
ThreatMon
⋅
NestJS Stealer: Unraveling the Inner Workings of a New Cybersecurity Menace |
2023-01-01
⋅
ThreatMon
⋅
RAT Goes Phishing: Dissecting the Stealthy Techniques of REM Phishing RAT |
2023-01-01
⋅
ThreatMon
⋅
Chaos Unleashed: a Technical Analysis of a Novel Ransomware Chaos |
2023-01-01
⋅
ThreatMon
⋅
Python's Dark Side When Crafting a Wallet Stealer Becomes Disturbingly Effortless |
2023-01-01
⋅
ThreatMon
⋅
Stealing in Stealth: Investigating a Python-based Evasive Malware Exela |
2023-01-01
⋅
ThreatMon
⋅
Unraveling the Layers: Analysis of Kimsuky's Multi-Staged Cyberattack Kimsuky |
2023-01-01
⋅
ThreatMon
⋅
The Konni APT Chronicle: Tracing Their Intelligence-Driven Attack Chain Konni |
2023-01-01
⋅
ThreatMon
⋅
Serpent Stealer Unmasked: Threat Analysis and Countermeasures |
2023-01-01
⋅
ThreatMon
⋅
The Anatomy of a Sidecopy Attack: From RAR Exploits to AllaKore RAT AllaKore |
2022-12-29
⋅
ThreatMon
⋅
Mars Stealer Analysis Mars Stealer |
2022-12-21
⋅
Trendmicro
⋅
Conti Team One Splinter Group Resurfaces as Royal Ransomware with Callback Phishing Attacks Royal Ransom |
2022-12-21
⋅
Team Cymru
⋅
Inside the IcedID BackConnect Protocol IcedID |
2022-12-16
⋅
Sekoia
⋅
The DPRK delicate sound of cyber AppleJeus AppleJeus SnatchCrypto |
2022-12-09
⋅
Secureworks
⋅
Drokbk Malware Uses GitHub as Dead Drop Resolver Drokbk |
2022-12-08
⋅
Team Cymru
⋅
Iranian Exploitation Activities Continue as of November 2022 |
2022-12-06
⋅
Blackberry
⋅
Mustang Panda Uses the Russian-Ukrainian War to Attack Europe and Asia Pacific Targets PlugX |
2022-12-05
⋅
Sekoia
⋅
Calisto show interests into entities involved in Ukraine war support |
2022-12-02
⋅
Avast Decoded
⋅
Hitching a ride with Mustang Panda PlugX |