Click here to download all references as Bib-File.•
| 2024-02-07
⋅
Medium s2wlab
⋅
Kimsuky disguised as a Korean company signed with a valid certificate to distribute Troll Stealer AlphaSeed Appleseed Troll Stealer |
| 2024-02-07
⋅
Malwarebytes
⋅
How to tell if your toothbrush is being used in a DDoS attack |
| 2024-02-07
⋅
CrowdStrike
⋅
HijackLoader Expands Techniques to Improve Defense Evasion HijackLoader |
| 2024-02-07
⋅
CISA
⋅
PRC State-Sponsored Actors Compromise and Maintain Persistent Access to U.S. Critical Infrastructure ScanLine |
| 2024-02-07
⋅
CISA
⋅
MAR-10448362-1.v1 Volt Typhoon ScanLine |
| 2024-02-06
⋅
Knownsec
⋅
APT-K-47 Organization Launches Espionage Attacks Using a New Trojan Tool Nimbo-C2 ORPCBackdoor |
| 2024-02-06
⋅
Knownsec
⋅
APT-K-47 Organization Launches Espionage Attacks Using a New Trojan Tool Nimbo-C2 ORPCBackdoor |
| 2024-02-06
⋅
Fortinet
⋅
Reverse engineering of Android/Phoenix Phoenix |
| 2024-02-06
⋅
Medium osamaellahi
⋅
Unfolding Agent Tesla: The Art of Credentials Harvesting. Agent Tesla |
| 2024-02-06
⋅
Group-IB
⋅
Dead-end job: ResumeLooters gang infects websites with XSS scripts and SQL injections to vacuum up job seekers' personal data and CVs ResumeLooters |
| 2024-02-06
⋅
The Hacker News
⋅
Beware: Fake Facebook Job Ads Spreading 'Ov3r_Stealer' to Steal Crypto and Credentials CrackedCantil Phemedrone Stealer |
| 2024-02-06
⋅
Trustwave
⋅
Facebook Advertising Spreads Novel Malware Variant Phemedrone Stealer |
| 2024-02-06
⋅
NCSC NL
⋅
Ministry of Defense of the Netherlands uncovers COATHANGER, a stealthy Chinese FortiGate RAT BOLDMOVE |
| 2024-02-05
⋅
SOCRadar
⋅
Dark Web Profile: CyberNiggers CyberNiggers |
| 2024-02-05
⋅
Tweet Highlighting the Integration of GhostSocks Service into Lumma Stealer GhostSocks |
| 2024-02-05
⋅
YouTube (John Hammond)
⋅
PikaBot Malware Analysis: Debugging in Visual Studio Pikabot |
| 2024-02-05
⋅
Reuters
⋅
Philippines wards off cyber attacks from China-based hackers |
| 2024-02-05
⋅
PCrisk
⋅
How to remove CrackedCantil from the operating system CrackedCantil |
| 2024-02-04
⋅
Viuleeenz
⋅
Understanding PEB and LDR Structures using IDA and LummaStealer Lumma Stealer |
| 2024-02-04
⋅
Infostealers
⋅
CrackedCantil: A Malware Symphony Breakdown CrackedCantil |