Click here to download all references as Bib-File.•
2024-11-07
⋅
Cisco Talos
⋅
Unwrapping the emerging Interlock ransomware attack Rhysida |
2024-11-07
⋅
ESET Research
⋅
APT Activity Report: Abusing Cloud Services and VPN Platforms in the Pursuit of New Prey FrostyNeighbor |
2024-11-07
⋅
Perception Point
⋅
Evasive ZIP Concatenation: Trojan Targets Windows Users SmokeLoader |
2024-11-07
⋅
Logpoint
⋅
Hiding in Plain Sight: The Subtle Art of Loki Malware’s Obfuscation Loki Password Stealer (PWS) |
2024-11-06
⋅
Sophos
⋅
Bengal cat lovers in Australia get psspsspss’d in Google-driven Gootloader campaign GootLoader |
2024-11-06
⋅
Cloudsek
⋅
Mozi Resurfaces as Androxgh0st Botnet: Unraveling The Latest Exploitation Wave Mozi |
2024-11-06
⋅
YouTube ( Hexacon)
⋅
Caught in the wild - Past, present and future |
2024-11-06
⋅
Kaspersky Labs
⋅
New SteelFox Trojan mimics software activators, stealing sensitive data and mining cryptocurrency |
2024-11-05
⋅
Hunt.io
⋅
RunningRAT’s Next Move: From Remote Access to Crypto Mining for Profit Running RAT |
2024-11-04
⋅
Israel National Cyber Directorate (INCD)
⋅
Deep Drive Analysis of the BeaverTail Infostealer BeaverTail |
2024-11-04
⋅
Cleafy
⋅
ToxicPanda: a new banking trojan from Asia hit Europe and LATAM ToxicPanda |
2024-11-04
⋅
Securonix
⋅
CRON#TRAP: Emulated Linux Environments as the Latest Tactic in Malware Staging Chisel |
2024-11-01
⋅
LevelBlue
⋅
Ngioweb Remains Active 7 Years Later Ngioweb |
2024-11-01
⋅
Google
⋅
Finding Malware: Detecting GOOTLOADER with Google Security Operations. GootLoader |
2024-10-31
⋅
Twitter (@MonThreat)
⋅
Tweet about EvilByte claiming to have hacked MyFatoorah Evilbyte |
2024-10-31
⋅
Hunt.io
⋅
Tricks, Treats, and Threats: Cobalt Strike & the Goblin Lurking in Plain Sight Cobalt Strike |
2024-10-31
⋅
Spamhaus
⋅
Toot about Darkgate / SSLoad targeting Ukraine DarkGate SSLoad |
2024-10-31
⋅
Sophos X-Ops
⋅
Pacific Rim: Inside the Counter-Offensive—The TTPs Used to Neutralize China-Based Threats Asnarök |
2024-10-31
⋅
Sophos X-Ops
⋅
Pacific Rim timeline: Information for defenders from a braid of interlocking attack campaigns Asnarök Tstark |
2024-10-31
⋅
Microsoft
⋅
Chinese threat actor Storm-0940 uses credentials from password spray attacks from a covert network Storm-0940 |