Click here to download all references as Bib-File.•
| 2024-01-30
            
            ⋅
            
            DCSO
            ⋅ Reporting on Volt Typhoon’s “JDY” Botnet Administration Via Tor Sparks Questions | 
| 2024-01-30
            
            ⋅
            
            abuse.ch
            ⋅ JinxLoader samples on YARAify JinxLoader | 
| 2024-01-30
            
            ⋅
            
            Mandiant
            ⋅ Evolution of UNC4990: Uncovering USB Malware's Hidden Depths QUIETBOARD Vetta Loader UNC4990 | 
| 2024-01-29
            
            ⋅
            
            hacked.codes
            ⋅ Technical analysis of WinRAR zero-day malware and C2 protocol emulation | 
| 2024-01-29
            
            ⋅
            
            Aquasec
            ⋅ HeadCrab 2.0: Evolving Threat in Redis Malware Landscape HeadCrab | 
| 2024-01-29
            
            ⋅
            
            SonicWall
            ⋅ Blackwood APT Group Has a New DLL Loader NSPX30 Blackwood | 
| 2024-01-29
            
            ⋅
            
            Synacktiv
            ⋅ KrustyLoader - Rust malware linked to Ivanti ConnectSecure compromises KrustyLoader | 
| 2024-01-29
            
            ⋅
            
            HarfangLab
            ⋅ Compromised Routers Are Still Leveraged as Malicious Infrastructure to Target Government Organizations in Europe and the Caucasus MASEPIE OCEANMAP | 
| 2024-01-26
            
            ⋅
            
            Trendmicro
            ⋅ Spot the Difference: An Analysis of the New LODEINFO Campaign by Earth Kasha Anel Cobalt Strike LODEINFO NOOPDOOR | 
| 2024-01-26
            
            ⋅
            
            SOCRadar
            ⋅ Russian APT Operation: Star Blizzard | 
| 2024-01-26
            
            ⋅
            
            Ars Technica
            ⋅ The life and times of Cozy Bear, the Russian hackers who just hit Microsoft and HPE | 
| 2024-01-25
            
            ⋅
            
            IBM
            ⋅ Broomstick Analysis Report (IRIS-17079) Broomstick | 
| 2024-01-25
            
            ⋅
            
            JSAC 2024
            ⋅ NSPX30: A sophisticated AitM-enabled implant evolving since 2005 NSPX30 ProjectWood | 
| 2024-01-25
            
            ⋅
            
            ESET Research
            ⋅ NSPX30: A sophisticated AitM-enabled implant evolving since 2005 NSPX30 ProjectWood Blackwood | 
| 2024-01-25
            
            ⋅
            
            JSAC 2024
            ⋅ The Secret Life of RATs: connecting the dots by dissecting multiple backdoors DracuLoader GroundPeony HemiGate PlugX | 
| 2024-01-25
            
            ⋅
            
            JSAC 2024
            ⋅ Threat Intelligence of Abused Public Post-Exploitation Frameworks AsyncRAT DCRat Empire Downloader GRUNT Havoc Koadic Merlin PoshC2 Quasar RAT Sliver | 
| 2024-01-25
            
            ⋅
            
            JSAC 2024
            ⋅ Unveiling TeleBoyi: Chinese APT Group Targeting Critical Infrastructure Worldwide PlugX | 
| 2024-01-25
            
            ⋅
            
            JSAC 2024
            ⋅ Lazarus Group’s Large-scale Threats via Watering Hole and Financial Software | 
| 2024-01-25
            
            ⋅
            
            JSAC 2024
            ⋅ A Study on Long-Term Trends about Amadey C2 Infrastructure Amadey | 
| 2024-01-25
            
            ⋅
            
            JSAC 2024
            ⋅ Operation So-seki: You Are a Threat Actor. As Yet You Have No Name |