Click here to download all references as Bib-File.•
2024-07-19
⋅
US Department of the Treasury
⋅
Treasury Sanctions Leader and Primary Member of the Cyber Army of Russia Reborn |
2024-07-18
⋅
Mandiant
⋅
APT41 Has Arisen From the DUST DUSTTRAP PINEGROVE |
2024-07-18
⋅
Mandiant
⋅
APT41 Has Arisen From the DUST Cobalt Strike |
2024-07-18
⋅
Forescout
⋅
Emerging IoT Wiper Malware: Kaden and New LOLFME Botnet Variants Kaden |
2024-07-17
⋅
Huntress Labs
⋅
Fake Browser Updates Lead to BOINC Volunteer Computing Software FAKEUPDATES MintsLoader AsyncRAT |
2024-07-17
⋅
SYGNIA
⋅
The Return of Ghost Emperor’s Demodex GhostEmperor GhostEmperor |
2024-07-16
⋅
cocomelonc
⋅
Malware and cryptography 29: LOKI payload encryption. Simple C example. |
2024-07-16
⋅
Recorded Future
⋅
TAG-100 Uses Open-Source Tools in Suspected Global Espionage Campaign, Compromising Two Asia-Pacific Intergovernmental Bodies Cobalt Strike |
2024-07-16
⋅
Sentinel LABS
⋅
NullBulge | Threat Actor Masquerades as Hacktivist Group Rebelling Against AI AsyncRAT LockBit XWorm Nullbulge |
2024-07-16
⋅
JPCERT/CC
⋅
MirrorFace Attack against Japanese Organisations LODEINFO NOOPDOOR |
2024-07-15
⋅
Objective-See
⋅
This Meeting Should Have Been an Email: A DPRK stealer, dubbed BeaverTail, targets users via a trojanized meeting app BeaverTail BeaverTail InvisibleFerret |
2024-07-15
⋅
Sekoia
⋅
MuddyWater replaces Atera by custom MuddyRot implant in a recent campaign bugsleep |
2024-07-15
⋅
Check Point
⋅
New BugSleep Backdoor Deployed in Recent MuddyWater Campaigns bugsleep |
2024-07-15
⋅
ThreatMon
⋅
Kematian Stealer Technical Malware Analysis Kematian Stealer |
2024-07-15
⋅
Trendmicro
⋅
CVE-2024-38112: Void Banshee Targets Windows Users Through Zombie Internet Explorer in Zero-Day Attacks Void Banshee |
2024-07-15
⋅
Trend Micro
⋅
CVE-2024-38112: Void Banshee Targets Windows Users Through Zombie Internet Explorer in Zero-Day Attacks |
2024-07-14
⋅
Phylum
⋅
Fake AWS Packages Ship Command and Control Malware In JPEG Files |
2024-07-14
⋅
Medium b.magnezi
⋅
Malware Analysis - Rhadamanthys Rhadamanthys |
2024-07-13
⋅
cocomelonc
⋅
Malware development: persistence - part 25. Create symlink from legit to evil. Simple C example. |
2024-07-11
⋅
Orange Cyberdefense
⋅
R0BL0CH0N TDS: A deep dive into the infrastructure of an affiliate marketing scam |