Click here to download all references as Bib-File.•
2024-06-13
⋅
Volexity
⋅
DISGOMOJI Malware Used to Target Indian Government |
2024-06-12
⋅
Symantec
⋅
Ransomware Attackers May Have Used Privilege Escalation Vulnerability as Zero-day Black Basta |
2024-06-12
⋅
The Cyber Express
⋅
Hack Alert: SN Blackmeta Claims Cyberattack on Snapchat Over Explicit Content and Alleged Political Bias! Blackmeta |
2024-06-12
⋅
cocomelonc
⋅
Malware development trick 39: Run payload via EnumDesktopsA. Simple Nim example. |
2024-06-12
⋅
Elastic
⋅
Dipping into Danger: The WARMCOOKIE backdoor WarmCookie |
2024-06-12
⋅
⋅
Gatewatcher
⋅
Nova Stealer, le malware made in France Nova Stealer |
2024-06-12
⋅
Symantec
⋅
Ransomware Attackers May Have Used Privilege Escalation Vulnerability as Zero-day Black Basta |
2024-06-12
⋅
Gdata
⋅
New backdoor BadSpace delivered by high-ranking infected websites WarmCookie |
2024-06-11
⋅
Zscaler
⋅
A Brief History of SmokeLoader, Part 1 SmokeLoader |
2024-06-10
⋅
The Hacker News
⋅
More_eggs Malware Disguised as Resumes Targets Recruiters in Phishing Attack More_eggs |
2024-06-10
⋅
Zscaler
⋅
Technical Analysis of the Latest Variant of ValleyRAT ValleyRAT |
2024-06-09
⋅
XLab
⋅
New Threat: A Deep Dive Into the Zergeca Botnet Zergeca |
2024-06-07
⋅
SOCRadar
⋅
Grandoreiro Malware Campaign: A Global Threat to Banking Security Grandoreiro |
2024-06-07
⋅
Security Affairs
⋅
Pandabuy was extorted twice by the same Threat Actor IntelBroker |
2024-06-06
⋅
Hunt.io
⋅
Tracking LightSpy: Certificates as Windows into Adversary Behavior lightSpy |
2024-06-06
⋅
CrowdStrike
⋅
EMBERSim: A Large-Scale Databank for Boosting Similarity Search in Malware Analysis |
2024-06-06
⋅
Medium b.magnezi
⋅
Agent Tesla Analysis Agent Tesla |
2024-06-06
⋅
ANY.RUN
⋅
Example Run on ANY.RUN for GaboonGrabber GaboonGrabber |
2024-06-06
⋅
Medium b.magnezi
⋅
Remcos RAT Analysis Remcos |
2024-06-06
⋅
kienmanowar Blog
⋅
[QuickNote] DarkGate – Make AutoIt Great Again DarkGate |