Click here to download all references as Bib-File.•
2025-02-15
⋅
⋅
Youtube (greenplan)
⋅
[BINARY REFINERY] (Emmenhtal) - Deobfuscation of a custom obfuscation algorithm Emmenhtal |
2025-02-15
⋅
Medium TRAC Labs
⋅
Don’t Ghost the SocGholish: GhostWeaver Backdoor FAKEUPDATES GhostWeaver |
2025-02-15
⋅
c-b.io
⋅
Dissecting a fresh BlankGrabber sample BlankGrabber |
2025-02-14
⋅
Twitter (@DTCERT)
⋅
Twitter Thread on a password-protected loader observed in a vishing campaign Unidentified 120 |
2025-02-13
⋅
Moonlock
⋅
Cybercrooks Are Using Fake Job Listings to Steal Crypto GolangGhost |
2025-02-13
⋅
Elastic
⋅
From South America to Southeast Asia: The Fragile Web of REF7707 FINALDRAFT FINALDRAFT GUIDLOADER PATHLOADER REF7707 |
2025-02-13
⋅
Securonix
⋅
Analyzing DEEP#DRIVE: North Korean Threat Actors Observed Exploiting Trusted Platforms for Targeted Attacks RandomQuery |
2025-02-13
⋅
Intel 471
⋅
Threat hunting case study: SocGholish FAKEUPDATES |
2025-02-13
⋅
Symantec
⋅
China-linked Espionage Tools Used in Ransomware Attacks PlugX |
2025-02-13
⋅
Elastic
⋅
You've Got Malware: FINALDRAFT Hides in Your Drafts FINALDRAFT FINALDRAFT PATHLOADER |
2025-02-13
⋅
Recorded Future
⋅
Inside the Scam: North Korea’s IT Worker Threat BeaverTail OtterCookie InvisibleFerret |
2025-02-13
⋅
Microsoft
⋅
Storm-2372 conducts device code phishing campaign Storm-2372 |
2025-02-13
⋅
Volexity
⋅
Multiple Russian Threat Actors Targeting Microsoft Device Code Authentication |
2025-02-13
⋅
Recorded Future
⋅
RedMike (Salt Typhoon) Exploits Vulnerable Cisco Devices of Global Telecommunications Providers GhostEmperor |
2025-02-12
⋅
cyble
⋅
BTMOB RAT: Newly Discovered Android Malware Spreading via Phishing Sites BTMOB RAT |
2025-02-12
⋅
Group-IB
⋅
RansomHub Never Sleeps Episode 1: The evolution of modern ransomware RansomHub |
2025-02-12
⋅
Hunt.io
⋅
Tracking Pyramid C2: Identifying Post-Exploitation Servers in Hunt Pyramid |
2025-02-12
⋅
⋅
Donga
⋅
Suspected North Korean hacker hacks a large number of data from a government document system developer |
2025-02-12
⋅
cyber.wtf blog
⋅
Unpacking Pyarmor v8+ scripts AsyncRAT DCRat XWorm |
2025-02-12
⋅
Red Canary
⋅
Defying tunneling: A Wicked approach to detecting malicious network traffic AsyncRAT DCRat NjRAT XWorm |