Click here to download all references as Bib-File.•
2023-01-05
⋅
Bleeping Computer
⋅
SpyNote Android malware infections surge after source code leak SpyNote |
2023-01-05
⋅
Logpoint
⋅
A crowning achievement: Exploring the exploit of Royal ransomware Royal Ransom |
2023-01-05
⋅
Mandiant
⋅
Turla: A Galaxy of Opportunity KopiLuwak Andromeda QUIETCANARY |
2023-01-04
⋅
CSO Online
⋅
Cyberattacks against governments jumped 95% in last half of 2022, CloudSek says BlueHornet |
2023-01-04
⋅
Malware development tricks: part 26. Mutex. C++ example. AsyncRAT Conti HelloKitty |
2023-01-04
⋅
Unpacking RedLine Stealer RedLine Stealer |
2023-01-04
⋅
Avertium
⋅
An In-Depth Look at PLAY Ransomware PLAY |
2023-01-04
⋅
Bleeping Computer
⋅
Rackspace confirms Play ransomware was behind recent cyberattack PLAY |
2023-01-04
⋅
PRODAFT
⋅
UNC1151 Group Indicators of Compromise (IOC) |
2023-01-04
⋅
K7 Security
⋅
Pupy RAT hiding under WerFault’s cover pupy |
2023-01-03
⋅
Malware Traffic Analysis
⋅
2023-01-03 (TUESDAY) - GOOGLE AD --> FAKE NOTPAD++ PAGE --> RHADAMANTHYS STEALER Rhadamanthys |
2023-01-03
⋅
Qualys
⋅
BitRAT Now Sharing Sensitive Bank Data as a Lure BitRAT |
2023-01-03
⋅
Security Joes
⋅
Raspberry Robin Detected ITW Targeting Insurance & Financial Institutes In Europe Raspberry Robin |
2023-01-01
⋅
Microsoft
⋅
Microsoft Digital Defense Report 2023 Storm-0381 Storm-1133 |
2023-01-01
⋅
ThreatMon
⋅
APT41's Attack Chain: Exe-LolBins Leads to Powershell Backdoor with Telegram C2 |
2023-01-01
⋅
ThreatMon
⋅
APT Blind Eagles Malware Arsenal Technical Analysis LimeRAT |
2023-01-01
⋅
ThreatMon
⋅
The Rise of Dark Power: A Close Look at the Group and their Ransomware |
2023-01-01
⋅
ThreatMon
⋅
Zaraza Bot: The New Russian Credential Stealer |
2023-01-01
⋅
ThreatMon
⋅
Reverse Engineering RokRAT: A Closer Look at APT37’s Onedrive-Based Attack Vector RokRAT |
2023-01-01
⋅
ThreatMon
⋅
Threat Analysis: SharpPanda APT’s Attack Chain Targeting G20 Nations |