Click here to download all references as Bib-File.•
2024-12-18
⋅
Bleeping Computer
⋅
Raccoon Stealer malware operator gets 5 years in prison after guilty plea Raccoon RecordBreaker |
2024-12-18
⋅
KELA
⋅
Three Months After the Storm: Did Cybercriminals Move to Telegram Alternatives? |
2024-12-17
⋅
SOCRadar
⋅
Dark Peep #17: Dark Web Manifesto, Hacker Forums, and Ransomware Misadventures INDOHAXSEC TEAM |
2024-12-17
⋅
Trend Micro
⋅
Earth Koshchei Coopts Red Team Tools in Complex RDP Attacks |
2024-12-17
⋅
Cybereason
⋅
Your Data Is Under New Lummanagement: The Rise of LummaStealer Lumma Stealer |
2024-12-17
⋅
BitSight
⋅
BADBOX Botnet Is Back BADBOX |
2024-12-17
⋅
Proofpoint
⋅
Hidden in Plain Sight: TA397’s New Attack Chain Delivers Espionage RATs MiyaRAT WmRAT HAZY TIGER |
2024-12-16
⋅
Gdata
⋅
New I2PRAT communicates via anonymous peer-to-peer network Unidentified 118 |
2024-12-16
⋅
cocomelonc
⋅
Malware and cryptography 36 - random sbox generation algorithms: Fisher-Yates shuffle. Simple C example. |
2024-12-16
⋅
cocomelonc
⋅
Malware and cryptography 37 - Nonlinearity. Walsh Transform. Simple C example. |
2024-12-16
⋅
Morphisec
⋅
CoinLurker: The Stealer Powering the Next Generation of Fake Updates ClearFake FAKEUPDATES |
2024-12-16
⋅
Zscaler
⋅
Technical Analysis of RiseLoader RiseLoader |
2024-12-16
⋅
Guardio Labs
⋅
“DeceptionAds” — Fake Captcha Driving Infostealer Infections and a Glimpse to the Dark Side of Internet Advertising Lumma Stealer |
2024-12-15
⋅
Malwarebytes
⋅
Malicious ad distributes SocGholish malware to Kaiser Permanente employees FAKEUPDATES |
2024-12-14
⋅
Axel's IT Security Research
⋅
How to Identify XenoRAT C2 Servers XenoRAT |
2024-12-13
⋅
Forcepoint
⋅
VIPKeyLogger Infostealer in the Wild VIP Keylogger |
2024-12-13
⋅
Bleeping Computer
⋅
Germany blocks BadBox malware loaded on 30,000 Android devices BADBOX |
2024-12-13
⋅
Medium 0x_b0mb3r
⋅
Technical Analysis: Magecart Skimmer magecart |
2024-12-13
⋅
Securite360.net
⋅
A Painful Quickheal QuickHeal |
2024-12-12
⋅
Hunt.io
⋅
Oyster’s Trail: Resurgence of Infrastructure Linked to Ransomware and Cybercrime Actors Broomstick |