Click here to download all references as Bib-File.•
2023-01-19
⋅
Team Cymru
⋅
Darth Vidar: The Dark Side of Evolving Threat Infrastructure Vidar |
2023-01-12
⋅
EclecticIQ
⋅
QakBot Malware Used Unpatched Vulnerability to Bypass Windows OS Security Feature QakBot |
2023-01-10
⋅
ESET Research
⋅
StrongPity espionage campaign targeting Android users |
2023-01-09
⋅
YouTube (Embee Research)
⋅
Malware Analysis - VBS Decoding With Cyberchef (Nanocore Loader) Nanocore RAT |
2023-01-06
⋅
Nisos
⋅
Coldriver Group Research Report |
2023-01-05
⋅
Check Point Research
⋅
Blindeagle Targeting Ecuador with Sharpened Tools APT-C-36 |
2023-01-05
⋅
Phylum
⋅
A Deep Dive Into poweRAT: a Newly Discovered Stealer/RAT Combo Polluting PyPI poweRAT |
2023-01-01
⋅
ThreatMon
⋅
APT41's Attack Chain: Exe-LolBins Leads to Powershell Backdoor with Telegram C2 |
2023-01-01
⋅
ThreatMon
⋅
APT Blind Eagles Malware Arsenal Technical Analysis LimeRAT |
2023-01-01
⋅
ThreatMon
⋅
The Rise of Dark Power: A Close Look at the Group and their Ransomware |
2023-01-01
⋅
ThreatMon
⋅
Zaraza Bot: The New Russian Credential Stealer |
2023-01-01
⋅
ThreatMon
⋅
Reverse Engineering RokRAT: A Closer Look at APT37’s Onedrive-Based Attack Vector RokRAT |
2023-01-01
⋅
ThreatMon
⋅
Threat Analysis: SharpPanda APT’s Attack Chain Targeting G20 Nations |
2023-01-01
⋅
ThreatMon
⋅
Technical Analysis of RDPCredentialStealer: Uncovering Malware Targeting RDP Credentials with API Hooking |
2023-01-01
⋅
ThreatMon
⋅
Unraveling the Complex Infection Chain: Analysis of the SideCopy APT's Attack Action RAT |
2023-01-01
⋅
ThreatMon
⋅
From Slides to Threats: Transparent Tribe’s New Attack on Indian Government Entities Using Malicious PPT |
2023-01-01
⋅
ThreatMon
⋅
Solving the Puzzle: Reversing the New Stealer Jigsaw Jigsaw |
2023-01-01
⋅
ThreatMon
⋅
Unmasking Stealer X1na: A Technical Analysis of the Latest Threat |
2023-01-01
⋅
ThreatMon
⋅
NestJS Stealer: Unraveling the Inner Workings of a New Cybersecurity Menace |
2023-01-01
⋅
ThreatMon
⋅
RAT Goes Phishing: Dissecting the Stealthy Techniques of REM Phishing RAT |