Click here to download all references as Bib-File.•
| 2025-07-31
⋅
Microsoft
⋅
Frozen in transit: Secret Blizzard’s AiTM campaign against diplomats ApolloShadow |
| 2025-07-31
⋅
Reverse The Malware
⋅
SysTracer: Another Suite for Digital Forensics and Incident Response |
| 2025-07-31
⋅
Reverse The Malware
⋅
WhatChanged ? : A Digital Forensics and Incident Response Suite |
| 2025-07-31
⋅
Reverse The Malware
⋅
MultiMon: Advanced System Monitoring DFIR Suite |
| 2025-07-31
⋅
Reverse The Malware
⋅
Directory Monitor : DFIR Directory Monitoring Toolki |
| 2025-07-31
⋅
Reverse The Malware
⋅
Moo0 File Monitor : DFIR File Monitoring Toolkit |
| 2025-07-31
⋅
Reverse The Malware
⋅
Free Folder Monitor : DFIR Folders Monitoring Toolkit |
| 2025-07-31
⋅
Reverse The Malware
⋅
Directory Monitoring : DFIR Folders - Directory Monitoring |
| 2025-07-31
⋅
Reverse The Malware
⋅
ArtiFast Forensics Artifacts Investigation - ShellBags |
| 2025-07-31
⋅
Reverse The Malware
⋅
ArtiFast Forensics Investigation - USB Forensics |
| 2025-07-31
⋅
Reverse The Malware
⋅
Threat Intelligence Through NRD's ( New Registered Domain ) |
| 2025-07-31
⋅
Reverse The Malware
⋅
Threat Intelligence via TLD's ( Top Level Domain ) |
| 2025-07-31
⋅
Reverse The Malware
⋅
Threat Intelligence via GTLD's ( Generic Top Level Domain ) |
| 2025-07-31
⋅
Reverse The Malware
⋅
Threat Intelligence visa ccTLD ( country code top-level domain ) |
| 2025-07-31
⋅
Reverse The Malware
⋅
Threat Intelligence ( Compromised domain list ) via ZoneFiles |
| 2025-07-31
⋅
Reverse The Malware
⋅
Threat Intelligence via Newly Registered Domains |
| 2025-07-31
⋅
Reverse The Malware
⋅
Threat Intelligence vis Domain Monitoring ( ccTLD , gTLD , TLD , Malware Zones ) |
| 2025-07-31
⋅
Twitter (@Threatlabz)
⋅
Tweet about new variant with BEEF instead of !RHA as config magic bytes Rhadamanthys |
| 2025-07-30
⋅
RUSI
⋅
What Singapore's First Public Cyber Attribution Tells Us |
| 2025-07-30
⋅
cocomelonc
⋅
Mobile malware development trick 2. Abuse Telegram Bot API: Contacts. Simple Android (Java/Kotlin) stealer example. |