Click here to download all references as Bib-File.•
2024-12-18
⋅
eSentire
⋅
Winos4.0 “Online Module” Staging Component Used in CleverSoar Campaign ValleyRAT |
2024-12-18
⋅
Bleeping Computer
⋅
Raccoon Stealer malware operator gets 5 years in prison after guilty plea Raccoon RecordBreaker |
2024-12-18
⋅
KELA
⋅
Three Months After the Storm: Did Cybercriminals Move to Telegram Alternatives? |
2024-12-17
⋅
Trend Micro
⋅
Earth Koshchei Coopts Red Team Tools in Complex RDP Attacks |
2024-12-17
⋅
Cybereason
⋅
Your Data Is Under New Lummanagement: The Rise of LummaStealer Lumma Stealer |
2024-12-17
⋅
Proofpoint
⋅
Hidden in Plain Sight: TA397’s New Attack Chain Delivers Espionage RATs MiyaRAT WmRAT HAZY TIGER |
2024-12-16
⋅
Gdata
⋅
New I2PRAT communicates via anonymous peer-to-peer network Unidentified 118 |
2024-12-16
⋅
cocomelonc
⋅
Malware and cryptography 36 - random sbox generation algorithms: Fisher-Yates shuffle. Simple C example. |
2024-12-16
⋅
Morphisec
⋅
CoinLurker: The Stealer Powering the Next Generation of Fake Updates ClearFake FAKEUPDATES |
2024-12-16
⋅
Zscaler
⋅
Technical Analysis of RiseLoader RiseLoader |
2024-12-16
⋅
Guardio Labs
⋅
“DeceptionAds” — Fake Captcha Driving Infostealer Infections and a Glimpse to the Dark Side of Internet Advertising Lumma Stealer |
2024-12-14
⋅
Axel's IT Security Research
⋅
How to Identify XenoRAT C2 Servers XenoRAT |
2024-12-11
⋅
JPCERT/CC
⋅
Attack Exploiting Legitimate Service by APT-C-60 SpyGrace |
2024-12-11
⋅
Sublime
⋅
Xloader deep dive: Link-based malware delivery via SharePoint impersonation Xloader Formbook |
2024-12-11
⋅
Microsoft
⋅
Frequent freeloader part II: Russian actor Secret Blizzard using tools of other groups to attack Ukraine Amadey Kazuar Wipbot FlyingYeti |
2024-12-10
⋅
cyble
⋅
Head Mare Group Intensifies Attacks on Russia with PhantomCore Backdoor PhantomCore Head Mare |
2024-12-10
⋅
Zscaler
⋅
Inside Zloader’s Latest Trick: DNS Tunneling GhostSocks Zloader |
2024-12-10
⋅
Patreon (OALABS)
⋅
Live Stream VOD: The Many Faces of CryptBot (Paywall) CryptBot |
2024-12-09
⋅
SOC Prime
⋅
UAC-0185 aka UNC4221 Attack Detection: Hackers Target the Ukrainian Defense Forces and Military-Industrial Complex UAC-0185 |
2024-12-08
⋅
DataBreaches.net
⋅
Is KillSec3 Trying to Extort Victims Using Publicly Leaked Data? |