Click here to download all references as Bib-File.•
2023-02-20
⋅
cocomelonc
⋅
Malware AV/VM evasion - part 12: encrypt payload via TEA. Simple C++ example. |
2023-02-19
⋅
Medium System Weakness
⋅
Investigating a Fake KDDI Smishing Campaign that abuses Duck DNS Roaming Mantis |
2023-02-19
⋅
Geeky Panda Tales
⋅
The Infostealer Pie: Python Malware Analysis Venus Stealer |
2023-02-18
⋅
secrss
⋅
Don’t follow in the footsteps of the 4 billion data leak incident! Early warning for attacks in the financial and securities industries ValleyRAT |
2023-02-18
⋅
malware.love
⋅
TrueBot Analysis Part II - Static unpacker Silence |
2023-02-17
⋅
Trend Micro
⋅
Earth Kitsune Delivers New WhiskerSpy Backdoor via Watering Hole Attack WhiskerSpy Earth Kitsune |
2023-02-17
⋅
cyble
⋅
The Many Faces of Qakbot Malware: A Look at Its Diverse Distribution Methods QakBot |
2023-02-17
⋅
Twitter (@luc4m)
⋅
Tweets about Darkbit's intermittent encryption DarkBit |
2023-02-16
⋅
cyble
⋅
ALTOUFAN TEAM Targets the Middle East Altoufan Team |
2023-02-16
⋅
ThreatMon
⋅
APT SideCopy Targeting Indian Government Entities - Analysis of the new version of ReverseRAT Unidentified 005 (Sidecopy) ReverseRAT |
2023-02-16
⋅
SentinelOne
⋅
WIP26 Espionage | Threat Actors Abuse Cloud Infrastructure in Targeted Telco Attacks |
2023-02-16
⋅
ThreatZero
⋅
Mass Attack buhtiRansom - CVE-2022–47986 |
2023-02-16
⋅
EclecticIQ
⋅
Three Cases of Cyber Attacks on the Security Service of Ukraine and NATO Allies, Likely by Russian State-Sponsored Gamaredon |
2023-02-16
⋅
Trend Micro
⋅
Invitation to a Secret Event: Uncovering Earth Yako’s Campaigns MirrorKey TransBox Earth Yako |
2023-02-16
⋅
Check Point Research
⋅
Operation Silent Watch: Desktop Surveillance in Azerbaijan and Armenia OxtaRAT |
2023-02-16
⋅
Google
⋅
Fog of war: how the Ukraine conflict transformed the cyber threat landscape APT28 Ghostwriter SaintBear Sandworm Turla |
2023-02-15
⋅
The Record
⋅
Scandinavian Airlines hit by cyberattack, ‘Anonymous Sudan’ claims responsibility UserSec |
2023-02-15
⋅
CERT-EU
⋅
JP-23-01 - Sustained activity by specific threat actors |
2023-02-15
⋅
AhnLab
⋅
Paradise Ransomware Distributed Through AweSun Vulnerability Exploitation Paradise |
2023-02-15
⋅
Google
⋅
Fog of War: How the Ukraine Conflict Transformed the Cyber Threat Landscape CaddyWiper Dharma HermeticWiper INDUSTROYER2 PartyTicket WhisperGate Callisto Curious Gorge MUSTANG PANDA Turla |