Click here to download all references as Bib-File.•
2023-06-29
⋅
Avast Decoded
⋅
Decrypted: Akira Ransomware Akira |
2023-06-28
⋅
BI. ZONE Cyber Threats Research Team
⋅
Red Wolf is back to spy on commercial firms Red Wolf is back to spy on commercial firms RedCurl |
2023-06-24
⋅
Twitter (@embee_research)
⋅
SmokeLoader - Malware Analysis and Decoding With Procmon SmokeLoader |
2023-06-23
⋅
Phylum
⋅
Phylum Discovers Sophisticated Ongoing Attack on NPM |
2023-06-21
⋅
Elastic
⋅
Initial research exposing JOKERSPY JokerSpy |
2023-06-16
⋅
Palo Alto Networks: Cortex Threat Research
⋅
Through the Cortex XDR Lens: Uncovering a New Activity Group Targeting Governments in the Middle East and Africa CHINACHOPPER Ladon Yasso CL-STA-0043 |
2023-06-15
⋅
ESET Research
⋅
Android GravityRAT goes after WhatsApp backups Gravity RAT |
2023-06-15
⋅
Team Cymru
⋅
Darth Vidar: The Aesir Strike Back Vidar |
2023-06-14
⋅
VulnCheck
⋅
Fake Security Researcher GitHub Repositories Deliver Malicious Implant TorLoader |
2023-06-08
⋅
Twitter (@embee_research)
⋅
Practical Queries for Identifying Malware Infrastructure: An informal page for storing Censys/Shodan queries Amadey AsyncRAT Cobalt Strike QakBot Quasar RAT Sliver solarmarker |
2023-06-08
⋅
Check Point Research
⋅
Stealth Soldier Backdoor Used in Targeted Espionage Attacks in North Africa Stealth Soldier |
2023-05-25
⋅
cyble
⋅
Invicta Stealer Spreading Through Phony GoDaddy Refund Invoices Invicta Stealer |
2023-05-24
⋅
Check Point Research
⋅
Agrius Deploys MoneyBird in Targeted Attacks against Israeli Organizations Pink Sandstorm |
2023-05-24
⋅
Secureworks
⋅
Chinese Cyberespionage Group BRONZE SILHOUETTE Targets U.S. Government and Defense Organizations Volt Typhoon |
2023-05-23
⋅
ClearSky
⋅
Fata Morgana: Watering hole attack on shipping and logistics websites |
2023-05-23
⋅
ESET Research
⋅
Android app breaking bad: From legitimate screen recording to file exfiltration within a year |
2023-05-19
⋅
Twitter (@embee_research)
⋅
Analysis of Amadey Bot Infrastructure Using Shodan Amadey |
2023-05-18
⋅
Twitter (@embee_research)
⋅
Identifying Laplas Infrastructure Using Shodan and Censys LaplasClipper |
2023-05-16
⋅
Secureworks
⋅
The Growing Threat from Infostealers Graphiron GraphSteel Raccoon RedLine Stealer Rhadamanthys Taurus Stealer Vidar |
2023-05-16
⋅
Check Point Research
⋅
The Dragon Who Sold his Camaro: Analyzing a Custom Router Implant Horse Shell Camaro Dragon |