Click here to download all references as Bib-File.
2023-01-20 ⋅ cocomelonc ⋅ Malware development: persistence - part 21. Recycle Bin, My Documents COM extension handler. Simple C++ example. |
2023-01-20 ⋅ Blackberry ⋅ Emotet Returns With New Methods of Evasion Emotet IcedID |
2023-01-20 ⋅ The Hacker News ⋅ Chinese Hackers Exploited Recent Fortinet Flaw as 0-Day to Drop Malware BOLDMOVE BOLDMOVE |
2023-01-19 ⋅ Team Cymru ⋅ Darth Vidar: The Dark Side of Evolving Threat Infrastructure Vidar |
2023-01-19 ⋅ ThreatFabric ⋅ Hook: a new Ermac fork with RAT capabilities Hook |
2023-01-19 ⋅ Blackberry ⋅ Gamaredon (Ab)uses Telegram to Target Ukrainian Organizations Unidentified VBS 006 (Telegram Loader) |
2023-01-19 ⋅ Mandiant ⋅ Suspected Chinese Threat Actors Exploiting FortiOS Vulnerability (CVE-2022-42475) BOLDMOVE BOLDMOVE |
2023-01-19 ⋅ Kaspersky Labs ⋅ Roaming Mantis implements new DNS changer in its malicious mobile app in 2022 MoqHao |
2023-01-18 ⋅ SANS ISC ⋅ Malicious Google Ad --> Fake Notepad++ Page --> Aurora Stealer malware Aurora Stealer |
2023-01-18 ⋅ Twitter (@Gi7w0rm) ⋅ A long way to SectopRat SectopRAT |
2023-01-18 ⋅ Palo Alto Networks Unit 42 ⋅ Chinese Playful Taurus Activity in Iran turian |
2023-01-18 ⋅ ANSSI ⋅ Panorama of the Cyber Threat 2022 |
2023-01-17 ⋅ Trend Micro ⋅ Earth Bogle: Campaigns Target the Middle East with Geopolitical Lures NjRAT |
2023-01-17 ⋅ Trendmicro ⋅ Batloader Malware Abuses Legitimate Tools, Uses Obfuscated JavaScript Files in Q4 2022 Attacks BATLOADER |
2023-01-17 ⋅ Qianxin ⋅ Kasablanka Group Probably Conducted Compaigns Targeting Russia Ave Maria Loda |
2023-01-16 ⋅ ANALYST1 ⋅ Unlocking Lockbit: A Ransomware Story LockBit LockBit |
2023-01-16 ⋅ Medium elis531989 ⋅ Dancing With Shellcodes: Analyzing Rhadamanthys Stealer Rhadamanthys |
2023-01-16 ⋅ Twitter (@zachxbt) ⋅ Tweet on ETH movement of Lazarus |
2023-01-13 ⋅ nikhilh-20 ⋅ Getting Rusty and Stringy with Luna Ransomware Luna |
2023-01-13 ⋅ Twitter (@Ishusoka) ⋅ Tweets on updates regarding Lumma Stealer Lumma Stealer |