Click here to download all references as Bib-File.•
| 2023-01-01
⋅
ThreatMon
⋅
From Slides to Threats: Transparent Tribe’s New Attack on Indian Government Entities Using Malicious PPT |
| 2023-01-01
⋅
ThreatMon
⋅
Solving the Puzzle: Reversing the New Stealer Jigsaw Jigsaw |
| 2023-01-01
⋅
ThreatMon
⋅
Unmasking Stealer X1na: A Technical Analysis of the Latest Threat |
| 2023-01-01
⋅
ThreatMon
⋅
NestJS Stealer: Unraveling the Inner Workings of a New Cybersecurity Menace |
| 2023-01-01
⋅
ThreatMon
⋅
RAT Goes Phishing: Dissecting the Stealthy Techniques of REM Phishing RAT |
| 2023-01-01
⋅
ThreatMon
⋅
Chaos Unleashed: a Technical Analysis of a Novel Ransomware Chaos |
| 2023-01-01
⋅
ThreatMon
⋅
Python's Dark Side When Crafting a Wallet Stealer Becomes Disturbingly Effortless |
| 2023-01-01
⋅
ThreatMon
⋅
Stealing in Stealth: Investigating a Python-based Evasive Malware Exela |
| 2023-01-01
⋅
ThreatMon
⋅
Unraveling the Layers: Analysis of Kimsuky's Multi-Staged Cyberattack Kimsuky |
| 2023-01-01
⋅
ThreatMon
⋅
The Konni APT Chronicle: Tracing Their Intelligence-Driven Attack Chain Konni |
| 2023-01-01
⋅
ThreatMon
⋅
Serpent Stealer Unmasked: Threat Analysis and Countermeasures |
| 2023-01-01
⋅
ThreatMon
⋅
The Anatomy of a Sidecopy Attack: From RAR Exploits to AllaKore RAT AllaKore |
| 2023-01-01
⋅
Objective-See
⋅
The Mac Malware of 2022 |
| 2022-12-31
⋅
Jaalma's Blog
⋅
Analyzing a VIDAR Infostealer Sample Vidar |
| 2022-12-30
⋅
Interlab
⋅
Cyber Threat Report: RambleOn Android Malware - Detailed analysis report of cyber threat targeting journalist in South Korea through APT phishing campaign with malicious APK RambleOn |
| 2022-12-30
⋅
GOV.PL
⋅
Russian cyberattacks NoName057(16) |
| 2022-12-30
⋅
Cyber And Ramen blog
⋅
A Quick Look at ELF Bifrose (Part 1) Bifrost |
| 2022-12-29
⋅
The Record
⋅
This app will self-destruct: How Belarusian hackers created an alternative Telegram for activists Cyber Partisans |
| 2022-12-29
⋅
ThreatMon
⋅
Mars Stealer Analysis Mars Stealer |
| 2022-12-29
⋅
Minerva Labs
⋅
New CatB Ransomware Employs 2-Year Old DLL Hijacking Technique To Evade Detection CatB |