Click here to download all references as Bib-File.•
2022-11-10
⋅
Zscaler
⋅
Rise of Banking Trojan Dropper in Google Play Xenomorph |
2022-11-10
⋅
Fortinet
⋅
Ransomware Roundup: New Inlock and Xorist Variants Inlock Xorist |
2022-11-10
⋅
Intezer
⋅
How LNK Files Are Abused by Threat Actors BumbleBee Emotet Mount Locker QakBot |
2022-11-10
⋅
AhnLab
⋅
Penetration and Distribution Method of Gwisin Attacker Gwisin |
2022-11-09
⋅
Trend Micro
⋅
Hack the Real Box: APT41’s New Subgroup Earth Longzhi Cobalt Strike MimiKatz Earth Longzhi |
2022-11-09
⋅
Netskope
⋅
BlackCat Ransomware: Tactics and Techniques From a Targeted Attack BlackCat ExMatter |
2022-11-09
⋅
Cisco Talos
⋅
Threat Spotlight: Cyber Criminal Adoption of IPFS for Phishing, Malware Campaigns Agent Tesla |
2022-11-09
⋅
Security Intelligence
⋅
Ransomware-as-a-Service Transforms Gangs Into Businesses Eternity Stealer |
2022-11-08
⋅
DeimosC2: What SOC Analysts and Incident Responders Need to Know About This C&C Framework DeimosC2 |
2022-11-08
⋅
DCSO
⋅
#ShortAndMalicious: StrelaStealer aims for mail credentials StrelaStealer |
2022-11-08
⋅
AhnLab
⋅
LockBit 3.0 Being Distributed via Amadey Bot Amadey Gandcrab LockBit |
2022-11-08
⋅
cyble
⋅
Massive YouTube Campaign Targeting Over 100 Applications To Deliver Info Stealer RecordBreaker Vidar |
2022-11-07
⋅
Trend Micro
⋅
Massive Phishing Campaigns Target India Banks’ Clients AxBanker Elibomi |
2022-11-07
⋅
ThreatMon
⋅
Arkei Staler Analysis Arkei Stealer |
2022-11-07
⋅
SentinelOne
⋅
SocGholish Diversifies and Expands Its Malware Staging Infrastructure to Counter Defenders FAKEUPDATES |
2022-11-07
⋅
Darktrace
⋅
Inside the Yanluowang Leak: Organization, Members, and Tactics Yanluowang |
2022-11-06
⋅
LMNTRIX
⋅
Analysis Of Netwire RAT NetWire RC |
2022-11-05
⋅
cocomelonc
⋅
Malware analysis: part 6. Shannon entropy. Simple python script. |
2022-11-04
⋅
DataBreaches.net
⋅
Malaysian online stock brokerage firm victim of cyberattack Desorden Group |
2022-11-04
⋅
⋅
Github (hktalent)
⋅
Behinder Mem Shell Behinder |