Click here to download all references as Bib-File.•
2024-05-14
⋅
NBC
⋅
China-linked group uses malware to try to spy on commercial shipping, new report says |
2024-05-14
⋅
YouTube (botconf eu)
⋅
Panni pelmeni: Turla loves dumplings Pelmeni |
2024-05-14
⋅
Bern University of Applied Science
⋅
Forensic analysis of hook Android malware Hook |
2024-05-14
⋅
Check Point Research
⋅
Foxit PDF “Flawed Design” Exploitation Rafel RAT Agent Tesla AsyncRAT DCRat DONOT Nanocore RAT NjRAT Pony Remcos Venom RAT XWorm |
2024-05-14
⋅
Kaspersky
⋅
QakBot attacks with Windows zero-day (CVE-2024-30051) Cobalt Strike QakBot |
2024-05-14
⋅
ESET Research
⋅
Ebury is alive but unseen: 400k Linux servers compromised for cryptocurrency theft and financial gain Ebury |
2024-05-14
⋅
S-RM
⋅
Breaking new ground? Uncovering Akira's privilege escalation techniques Akira |
2024-05-13
⋅
Wavestealer Spotted In The Wild Wave Stealer |
2024-05-13
⋅
Emerging Threats
⋅
SIGS: W32/Badspace.Backdoor WarmCookie |
2024-05-13
⋅
Malsada Tech
⋅
Gootloader Isn’t Broken GootLoader |
2024-05-13
⋅
ESET Research
⋅
Ebury is alive but unseen: 400k Linux servers compromised for cryptocurrency theft and financial gain Ebury |
2024-05-13
⋅
Recorded Future
⋅
Exploring the Depths of SolarMarker's Multi-tiered Infrastructure solarmarker |
2024-05-11
⋅
Russian APT deploys new 'Kapeka' backdoor in Eastern European attacks Kapeka |
2024-05-10
⋅
⋅
Qianxin Threat Intelligence Center
⋅
Recruitment trap for blockchain practitioners: Analysis of suspected Lazarus (APT-Q-1) stealing operations BeaverTail |
2024-05-10
⋅
Rapid7 Labs
⋅
Ongoing Social Engineering Campaign Linked to Black Basta Ransomware Operators Black Basta Black Basta Cobalt Strike NetSupportManager RAT |
2024-05-10
⋅
CISA
⋅
AA24-131A: #StopRansomware: Black Basta Black Basta Black Basta |
2024-05-10
⋅
Elastic
⋅
Dissecting REMCOS RAT: An in- depth analysis of a widespread 2024 malware, Part Four Remcos |
2024-05-09
⋅
Meterpreter
⋅
Cybersecurity Firm Hacked: Sensitive Data on Sale IntelBroker |
2024-05-09
⋅
0x0d4y
⋅
[Case Study: Latrodectus] Analyzing and Implementing String Decryption Algorithms Latrodectus |
2024-05-08
⋅
Mandiant
⋅
M-Trends 2024 Special Report: Chinese Espionage Operations Targeting The Visibility Gap BOLDMOVE WHIRLPOOL |