Click here to download all references as Bib-File.•
2024-09-25
⋅
The Register
⋅
China claims Taiwan, not civilians, behind web vandalism Anonymous64 |
2024-09-20
⋅
McAfee
⋅
Behind the CAPTCHA: A Clever Gateway of Malware Emmenhtal Lumma Stealer |
2024-09-10
⋅
Talos Intelligence
⋅
DragonRank, a Chinese-speaking SEO manipulator service provider IISpy PlugX DragonRank |
2024-08-21
⋅
OODA Loop
⋅
Toyota Customer, Employee Data Leaked in Confirmed Data Breach ZeroSevenGroup |
2024-08-08
⋅
NSFOCUS
⋅
New APT Group Actor240524: A Closer Look at Its Cyber Tactics Against Azerbaijan and Israel ABCsync Actor240524 |
2024-08-05
⋅
ThreatFabric
⋅
Chameleon is now targeting employees: Masquerading as a CRM app Chameleon |
2024-08-04
⋅
Twitter (@embee_research)
⋅
Decoding a Cobalt Strike Downloader Script With CyberChef Cobalt Strike |
2024-07-30
⋅
Cyfirma
⋅
Mint Stealer: A Comprehensive Study of a Python-Based Information Stealer MintStealer |
2024-07-09
⋅
TG Soft
⋅
Italian government agencies and companies in the target of a Chinese APT 9002 RAT |
2024-07-08
⋅
⋅
Solar 4RAYS
⋅
Lifting Zmiy: hacking SCADA controllers in pursuit of prime victims Lifting Zmiy |
2024-06-13
⋅
Github (LambdaMamba)
⋅
Implementation of a Config Decryptor for Amadey Amadey |
2024-06-12
⋅
The Cyber Express
⋅
Hack Alert: SN Blackmeta Claims Cyberattack on Snapchat Over Explicit Content and Alleged Political Bias! Blackmeta |
2024-06-11
⋅
Kroll
⋅
PLAY Ransomware Group Gains Access via Citrix Bleed Vulnerability PLAY |
2024-06-05
⋅
QuoIntelligence
⋅
European Election Security At Risk: A Detailed Analysis of State-Sponsored, eCrime, and Hacktivist Threats Dragonbridge |
2024-06-05
⋅
⋅
Sekoia
⋅
The reverse engineering of malicious code in the ITC - Analysis of the evolution of a chain of infection (Slides) FlowCloud |
2024-05-04
⋅
Medium MITRE-Engenuity
⋅
Technical Deep Dive: Understanding the Anatomy of a Cyber Intrusion WIREFIRE |
2024-05-03
⋅
Aqua Nautilus
⋅
Kinsing Demystified: A Comprehensive Technical Guide Kinsing |
2024-05-01
⋅
Microsoft
⋅
“Dirty stream” attack: Discovering and mitigating a common vulnerability pattern in Android apps |
2024-04-19
⋅
dissect.ing
⋅
Exploiting a cryptographic vulnerability inside the Donex Ransomware Donex |
2024-04-15
⋅
UC Santa Cruz
⋅
A Tale of Two Industroyers: It was the Season of Darkness Industroyer INDUSTROYER2 |