Click here to download all references as Bib-File.•
| 2025-08-05
⋅
Defentive
⋅
Lost in Translation: Threat Actors Use SEO Poisoning and Fake DeepL Sites to Distribute Gh0st RAT Ghost RAT |
| 2025-08-05
⋅
The DFIR Report
⋅
From Bing Search to Ransomware: Bumblebee and AdaptixC2 Deliver Akira AdaptixC2 Akira BumbleBee |
| 2025-08-03
⋅
Reverse The Malware
⋅
Reverse Engineering of Word Document Honeyfiles |
| 2025-08-03
⋅
Reverse The Malware
⋅
Reverse Engineering of DLL Honeyfiles |
| 2025-08-03
⋅
Reverse The Malware
⋅
Reverse Engineering of PDF Document Honeyfiles |
| 2025-08-03
⋅
Reverse The Malware
⋅
One Click and You're Caught: HoneyFiles in Action |
| 2025-08-03
⋅
Reverse The Malware
⋅
Identifying a Fast Flux Techniques |
| 2025-08-03
⋅
Reverse The Malware
⋅
Identifying a Domain Generation Algorithm |
| 2025-08-03
⋅
Reverse The Malware
⋅
Gathering Indicators of Compromise Through Malware Datasets. |
| 2025-08-02
⋅
cocomelonc
⋅
MacOS hacking part 7: Minimal Linux-style shellcode on macOS (Intel). Simple NASM (Intel) and C examples |
| 2025-08-02
⋅
Reverse The Malware
⋅
Analysis of a Facebook Phishing Page |
| 2025-08-01
⋅
Belarus-Linked DSLRoot Proxy Network Deploys Hardware in U.S. Residences, Including Military Homes |
| 2025-08-01
⋅
Nextron Systems
⋅
Plague: A Newly Discovered PAM-Based Backdoor for Linux Plague |
| 2025-08-01
⋅
Reverse The Malware
⋅
SHA-256 C2 ( Command and Control Server ) Hashes |
| 2025-08-01
⋅
Reverse The Malware
⋅
Command and Control Server ( C2's ) Hashes |
| 2025-08-01
⋅
Reverse The Malware
⋅
Awesome C2 Panel Favicon Hashes |
| 2025-08-01
⋅
Reverse The Malware
⋅
Internet Search Engine Queries for Identifying C2 Panels |
| 2025-08-01
⋅
Reverse The Malware
⋅
Threat Hunting with 20 Urlscan.io Search Queries |
| 2025-08-01
⋅
Reverse The Malware
⋅
Feeds of Indicators Of Compromise ( TweetFeed ) |
| 2025-08-01
⋅
Medium RaghavtiResearch
⋅
https://medium.com/p/862eea4a2db4 |