Click here to download all references as Bib-File.•
| 2025-02-23
⋅
Github (albertzsigovits)
⋅
ToxicEye RAT config extraction and YARA signatures ToxicEye |
| 2025-02-22
⋅
⋅
Youtube (greenplan)
⋅
[BINARY REFINERY] (MintsLoader) - Deobfuscation of a simple XOR to get the URL MintsLoader |
| 2025-02-21
⋅
cyjax
⋅
How’s that for a malicious Linkc, new group launches DLS LinkC Pub |
| 2025-02-21
⋅
SonicWall
⋅
Remcos RAT Targets Europe: New AMSI and ETW Evasion Tactics Uncovered Remcos |
| 2025-02-20
⋅
RedHotCyber
⋅
Linkc Ransomware: The New Cybercriminal Group Targeting Artificial Intelligence Data LinkC Pub |
| 2025-02-20
⋅
Hunt.io
⋅
LightSpy Expands Command List to Include Social Media Platforms lightSpy |
| 2025-02-20
⋅
Trend Micro
⋅
Updated Shadowpad Malware Leads to Ransomware Deployment EvilExtractor PlugX ShadowPad Teleboyi |
| 2025-02-20
⋅
Cisco Talos
⋅
Weathering the storm: In the midst of a Typhoon |
| 2025-02-20
⋅
Reliaquest
⋅
48 Minutes: How Fast Phishing Attacks Exploit Weaknesses ReedBed |
| 2025-02-20
⋅
Trend Micro
⋅
Updated Shadowpad Malware Leads to Ransomware Deployment EvilExtractor NailaoLocker PlugX ShadowPad |
| 2025-02-20
⋅
Cyber Security News
⋅
APT-C-28 Group Launched New Cyber Attack With Fileless RokRat Malware RokRAT |
| 2025-02-20
⋅
Silent Push
⋅
Tweet on Tracking ValleyRAT Domains with ICP Licenses ValleyRAT |
| 2025-02-20
⋅
Infrawatch
⋅
GhostSocks - Lumma's Partner In Proxy GhostSocks Lumma Stealer |
| 2025-02-19
⋅
Natto Thoughts
⋅
The Pangu Team—iOS Jailbreak and Vulnerability Research Giant: A Member of i-SOON’s Exploit-Sharing Network |
| 2025-02-18
⋅
K7 Security
⋅
Exposing the Deceit: Phishing Sites Impersonating Government Entities |
| 2025-02-18
⋅
inversecos
⋅
An inside look at NSA (Equation Group) TTPs from China’s lense SECONDDATE |
| 2025-02-18
⋅
Proofpoint
⋅
An Update on Fake Updates: Two New Actors, and New Mac Malware Marcher FAKEUPDATES FrigidStealer Lumma Stealer |
| 2025-02-15
⋅
⋅
Youtube (greenplan)
⋅
[BINARY REFINERY] (Emmenhtal) - Deobfuscation of a custom obfuscation algorithm Emmenhtal |
| 2025-02-13
⋅
Zscaler
⋅
Technical Analysis of Xloader Versions 6 and 7 | Part 2 Xloader |
| 2025-02-13
⋅
Securonix
⋅
Analyzing DEEP#DRIVE: North Korean Threat Actors Observed Exploiting Trusted Platforms for Targeted Attacks RandomQuery |