Click here to download all references as Bib-File.•
| 2024-02-28
            
            ⋅
            
            eSentire
            ⋅
            
             XRed Backdoor: The Hidden Threat in Trojanized Programs XRed  | 
| 2024-02-28
            
            ⋅
            
            EchoCTI
            ⋅
            
             Raccoon Stealer V2.0 Technical Analysis Raccoon  | 
| 2024-02-28
            
            ⋅
            
            Security Intelligence
            ⋅
            
             X-Force data reveals top spam trends, campaigns and senior superlatives in 2023 404 Keylogger Agent Tesla Black Basta DarkGate Formbook IcedID Loki Password Stealer (PWS) Pikabot QakBot Remcos  | 
| 2024-02-28
            
            ⋅
            
            Avast Decoded
            ⋅
            
             Lazarus and the FudModule Rootkit: Beyond BYOVD with an Admin-to-Kernel Zero-Day FudModule  | 
| 2024-02-28
            
            ⋅
            
            Twitter (@haxrob)
            ⋅
            
             Tweet series regarding GTPDOOR GTPDOOR  | 
| 2024-02-28
            
            ⋅
            
            VMRay
            ⋅
            
             Just Carry A Ladder: Why Your EDR Let Pikabot Jump Through Pikabot  | 
| 2024-02-28
            
            ⋅
            
            Spamhaus
            ⋅
            
             Toot about SmokeLoader dropping Xehook Stealer SmokeLoader  | 
| 2024-02-27
            
            ⋅
            
            Mandiant
            ⋅
            
             Cutting Edge, Part 3: Investigating Ivanti Connect Secure VPN Exploitation and Persistence Attempts BUSHWALK Kubo Injector PITFUEL PITHOOK PITSOCK  | 
| 2024-02-27
            
            ⋅
            
            Cisco Talos
            ⋅
            
             TimbreStealer campaign targets Mexican users with financial lures TimbreStealer  | 
| 2024-02-27
            
            ⋅
            
            Mandiant
            ⋅
            
             When Cats Fly: Suspected Iranian Threat Actor UNC1549 Targets Israeli and Middle East Aerospace and Defense Sectors LIGHTRAIL MINIBIKE MINIBUS UNC1549  | 
| 2024-02-27
            
            ⋅
            
            Bitdefender
            ⋅
            
             When Stealers Converge: New Variant of Atomic Stealer in the Wild AMOS  | 
| 2024-02-27
            
            ⋅
            
            BitSight
            ⋅
            
             Hunting PrivateLoader: The malware behind InstallsKey PPI service PrivateLoader RisePro  | 
| 2024-02-27
            
            ⋅
            
            Doubleagent.net
            ⋅
            
             GTPDOOR - A novel backdoor tailored for covert access over the roaming exchange GTPDOOR  | 
| 2024-02-27
            
            ⋅
            
            Twitter (@greglesnewich)
            ⋅
            
             Tweet with context on TA421 / APT29 / Midnight Blizzard / BlueBravo / Cozy Bear WINELOADER  | 
| 2024-02-27
            
            ⋅
            
            splunk
            ⋅
            
             Unveiling Phemedrone Stealer: Threat Analysis and Detections Phemedrone Stealer  | 
| 2024-02-27
            
            ⋅
            
            Github (VenzoV)
            ⋅
            
             Wikiloader part 3 -> Explorer shellcode WikiLoader  | 
| 2024-02-27
            
            ⋅
            
            Zscaler
            ⋅
            
             European diplomats targeted by SPIKEDWINE with WINELOADER WINELOADER SPIKEDWINE  | 
| 2024-02-27
            
            ⋅
            
            US Department of Defense
            ⋅
            
             Russian Cyber Actors Use Compromised Routers to Facilitate Cyber Operations MooBot  | 
| 2024-02-26
            
            ⋅
            
            SOC Prime
            ⋅
            
             UAC-0149 Attack Detection: Hackers Launch a Targeted Attack Against the Armed Forces of Ukraine, as CERT-UA Reports COOKBOX UAC-0149  | 
| 2024-02-26
            
            ⋅
            
            SpyCloud
            ⋅
            
             “Pantsless Data”: Decoding Chinese Cybercrime TTPs  |