Click here to download all references as Bib-File.•
2023-09-07
⋅
Silent Push
⋅
'From Russia with a 71': Uncovering Gamaredon's fast flux infrastructure. New apex domains and ASN/IP diversity patterns discovered |
2023-09-07
⋅
Google
⋅
Active North Korean campaign targeting security researchers |
2023-09-07
⋅
abuse.ch
⋅
WhiteSnake Stealer malware sample on MalwareBazaar WhiteSnake Stealer |
2023-09-06
⋅
Bitdefender
⋅
Pizza Hut Australia leaks one million customers' details, claims ShinyHunters hacking group ShinyHunters |
2023-09-06
⋅
Malwarebytes
⋅
Mac users targeted in new malvertising campaign delivering Atomic Stealer AMOS NetSupportManager RAT |
2023-09-06
⋅
Zscaler
⋅
Steal-It Campaign Mocky LNK |
2023-09-06
⋅
Darktrace
⋅
The Rise of the Lumma Info-Stealer Lumma Stealer |
2023-09-06
⋅
Microsoft
⋅
Results of Major Technical Investigations for Storm-0558 Key Acquisition |
2023-09-06
⋅
TRUESEC
⋅
DarkGate Loader Malware Delivered via Microsoft Teams DarkGate |
2023-09-05
⋅
CISA
⋅
MAR-10454006.r5.v1 SUBMARINE, SKIPJACK, SEASPRAY, WHIRLPOOL, and SALTWATER Backdoors SALTWATER WHIRLPOOL UNC4841 |
2023-09-05
⋅
Github (JoelGMSec)
⋅
MultiPlatform HTTP Reverse Shell HTTP-Shell |
2023-09-05
⋅
⋅
AhnLab
⋅
BlueShell malware used in APT attacks targeting Korea and Thailand BlueShell SparkRAT |
2023-09-05
⋅
Morphisec
⋅
Chae$ 4: New Chaes Malware Variant Targeting Financial and Logistics Customers Chaes |
2023-09-04
⋅
VMRay
⋅
Amadey: New encoding with old tricks Amadey |
2023-09-04
⋅
⋅
Cert-UA
⋅
APT28 cyberattack: msedge as a bootloader, TOR and mockbin.org/website.hook services as a control center (CERT-UA#7469) |
2023-09-04
⋅
AhnLab
⋅
CHM Malware Using Fukushima Contaminated Water Discharge: RedEyes (ScarCruft) |
2023-09-04
⋅
Baltic News Network
⋅
Cert.lv: activist groups supported by Russia perform cyber attacks on Latvian state institutions |
2023-09-04
⋅
Github (muha2xmad)
⋅
A deep dive into DCRAT/DarkCrystalRAT malware DCRat |
2023-09-01
⋅
Trellix
⋅
ICYMI: Emotet Reappeared Early This Year, Unfortunately Emotet |
2023-09-01
⋅
VMRay
⋅
Understanding BumbleBee: BumbleBee’s malware configuration and clusters BumbleBee |