Click here to download all references as Bib-File.•
2024-12-02
⋅
Red Canary
⋅
Storm-1811 exploits RMM tools to drop Black Basta ransomware UNC4393 |
2024-12-02
⋅
TechSpot
⋅
Hacking group claims to have cracked Microsoft's software licensing security on a massive scale Massgrave |
2024-12-02
⋅
Kaspersky Labs
⋅
Horns&Hooves campaign delivers NetSupport RAT and BurnsRAT NetSupportManager RAT RMS |
2024-12-02
⋅
FortiGuard Labs
⋅
SmokeLoader Attack Targets Companies in Taiwan SmokeLoader |
2024-12-02
⋅
Medium b.magnezi
⋅
LokiBot Malware Analysis Loki Password Stealer (PWS) |
2024-11-30
⋅
cocomelonc
⋅
Malware and cryptography 35: encrypt payload via Treyfer algorithm. Simple C example. |
2024-11-30
⋅
Technical Evolution
⋅
REKOOBE APT-31 Linux Backdoor Analysis Rekoobe |
2024-11-29
⋅
Fortinet
⋅
Ransomware Roundup - Interlock Interlock Interlock Supper |
2024-11-28
⋅
Hunt.io
⋅
Uncovering Threat Actor Tactics: How Open Directories Provide Insight into XWorm Delivery Strategies XWorm |
2024-11-28
⋅
StrikeReady
⋅
RU APT targeting Energy Infrastructure (Unknown unknowns, part 3) Edam Emmenhtal |
2024-11-27
⋅
Rapid7
⋅
New “CleverSoar” Installer Targets Chinese and Vietnamese Users ValleyRAT |
2024-11-27
⋅
ESET Research
⋅
Bootkitty: Analyzing the first UEFI bootkit for Linux Bootkitty |
2024-11-26
⋅
Reco AI
⋅
Stealth in the Cloud: How APT36's ElizaRAT is Redefining Cyber Espionage ElizaRAT Operation C-Major |
2024-11-26
⋅
Trend Micro
⋅
Guess Who’s Back - The Return of ANEL in the Recent Earth Kasha Spear-phishing Campaign in 2024 Anel MirrorFace |
2024-11-26
⋅
Security Intelligence
⋅
What’s up India? PixPirate is back and spreading via WhatsApp PixPirate |
2024-11-26
⋅
Security Affairs
⋅
The source code of Banshee Stealer leaked online BANSHEE |
2024-11-25
⋅
Trend Micro
⋅
Game of Emperor: Unveiling Long Term Earth Estries Cyber Intrusions SNAPPYBEE |
2024-11-25
⋅
LinkedIn (Idan Tarab)
⋅
The IT Army of Ukraine: Cyber Resistance in the Digital Battlefield |
2024-11-22
⋅
cocomelonc
⋅
Linux malware development 3: linux process injection with ptrace. Simple C example. EvilGnome HiddenWasp Turla RAT |
2024-11-22
⋅
Microsoft
⋅
Microsoft shares latest intelligence on North Korean and Chinese threat actors at CYBERWARCON Storm-2077 |