Click here to download all references as Bib-File.•
2023-02-23
⋅
CERT.PL
⋅
A tale of Phobos - how we almost cracked a ransomware using CUDA Phobos |
2023-02-23
⋅
Jamf Blog
⋅
Evasive cryptojacking malware targeting macOS found lurking in pirated applications |
2023-02-23
⋅
Arctic Wolf
⋅
Getting Dumped: A Trust Relationship Destroyed by Lorenz Lorenz |
2023-02-22
⋅
SOC Prime
⋅
New Phishing Attack Detection Attributed to the UAC-0050 and UAC-0096 Groups Spreading Remcos Spyware Remcos UAC-0050 |
2023-02-22
⋅
Symantec
⋅
Hydrochasma: Previously Unknown Group Targets Medical and Shipping Organizations in Asia Cobalt Strike |
2023-02-22
⋅
Bitdefender
⋅
S1deload Stealer – Exploring the Economics of Social Network Account Hijacking |
2023-02-21
⋅
Sekoia
⋅
One Year After: The Cyber Implications of the Russo-Ukrainian War Callisto |
2023-02-21
⋅
⋅
Cert-UA
⋅
Cyber attack of the group UAC-0050 (UAC-0096) using the Remcos program (CERT-UA#6011) Remcos UAC-0050 |
2023-02-21
⋅
Zscaler
⋅
Technical Analysis of Rhadamanthys Obfuscation Techniques Rhadamanthys |
2023-02-21
⋅
SecurityIntelligence
⋅
Direct Kernel Object Manipulation (DKOM) Attacks on ETW Providers FudModule |
2023-02-20
⋅
Sekoia
⋅
Stealc: a copycat of Vidar and Raccoon infostealers gaining in popularity – Part 1 Stealc |
2023-02-20
⋅
0xToxin Labs
⋅
Vidar Stealer H&M Campaign Vidar |
2023-02-20
⋅
Trendmicro
⋅
Royal Ransomware Expands Attacks by Targeting Linux ESXi Servers Royal Ransom Royal Ransom |
2023-02-20
⋅
cocomelonc
⋅
Malware AV/VM evasion - part 12: encrypt payload via TEA. Simple C++ example. |
2023-02-19
⋅
Medium System Weakness
⋅
Investigating a Fake KDDI Smishing Campaign that abuses Duck DNS Roaming Mantis |
2023-02-19
⋅
Geeky Panda Tales
⋅
The Infostealer Pie: Python Malware Analysis Venus Stealer |
2023-02-18
⋅
secrss
⋅
Don’t follow in the footsteps of the 4 billion data leak incident! Early warning for attacks in the financial and securities industries ValleyRAT |
2023-02-18
⋅
malware.love
⋅
TrueBot Analysis Part II - Static unpacker Silence |
2023-02-17
⋅
Trend Micro
⋅
Earth Kitsune Delivers New WhiskerSpy Backdoor via Watering Hole Attack WhiskerSpy Earth Kitsune |
2023-02-17
⋅
cyble
⋅
The Many Faces of Qakbot Malware: A Look at Its Diverse Distribution Methods QakBot |