Click here to download all references as Bib-File.•
2024-07-18
⋅
Forescout
⋅
Emerging IoT Wiper Malware: Kaden and New LOLFME Botnet Variants Kaden |
2024-07-17
⋅
SYGNIA
⋅
The Return of Ghost Emperor’s Demodex GhostEmperor GhostEmperor |
2024-07-16
⋅
cocomelonc
⋅
Malware and cryptography 29: LOKI payload encryption. Simple C example. |
2024-07-16
⋅
Recorded Future
⋅
TAG-100 Uses Open-Source Tools in Suspected Global Espionage Campaign, Compromising Two Asia-Pacific Intergovernmental Bodies Cobalt Strike |
2024-07-16
⋅
Sentinel LABS
⋅
NullBulge | Threat Actor Masquerades as Hacktivist Group Rebelling Against AI AsyncRAT LockBit XWorm Nullbulge |
2024-07-16
⋅
JPCERT/CC
⋅
MirrorFace Attack against Japanese Organisations LODEINFO NOOPDOOR |
2024-07-15
⋅
Sekoia
⋅
MuddyWater replaces Atera by custom MuddyRot implant in a recent campaign bugsleep |
2024-07-15
⋅
Check Point
⋅
New BugSleep Backdoor Deployed in Recent MuddyWater Campaigns bugsleep |
2024-07-15
⋅
ThreatMon
⋅
Kematian Stealer Technical Malware Analysis Kematian Stealer |
2024-07-15
⋅
Trendmicro
⋅
CVE-2024-38112: Void Banshee Targets Windows Users Through Zombie Internet Explorer in Zero-Day Attacks Void Banshee |
2024-07-15
⋅
Trend Micro
⋅
CVE-2024-38112: Void Banshee Targets Windows Users Through Zombie Internet Explorer in Zero-Day Attacks |
2024-07-14
⋅
Phylum
⋅
Fake AWS Packages Ship Command and Control Malware In JPEG Files |
2024-07-14
⋅
Medium b.magnezi
⋅
Malware Analysis - Rhadamanthys Rhadamanthys |
2024-07-13
⋅
cocomelonc
⋅
Malware development: persistence - part 25. Create symlink from legit to evil. Simple C example. |
2024-07-11
⋅
Orange Cyberdefense
⋅
R0BL0CH0N TDS: A deep dive into the infrastructure of an affiliate marketing scam |
2024-07-11
⋅
Google
⋅
Finding Malware: Detecting EMPTYSPACE with Google Security Operations Vetta Loader |
2024-07-11
⋅
Zscaler
⋅
MoonWalk: A deep dive into the updated arsenal of APT41 | Part 2 MoonWalk |
2024-07-11
⋅
sysdig
⋅
CRYSTALRAY: Inside the Operations of a Rising Threat Actor Exploiting OSS Tools CRYSTALRAY |
2024-07-11
⋅
McAfee
⋅
ClickFix Deception: A Social Engineering Tactic to Deploy Malware DarkGate Lumma Stealer |
2024-07-11
⋅
NCSC Switzerland
⋅
Brief technical analysis of the "Poseidon Stealer" malware Poseidon Stealer |