Click here to download all references as Bib-File.•
2024-07-02
⋅
Sekoia
⋅
Exposing FakeBat loader: distribution methods and adversary infrastructure BlackCat Royal Ransom EugenLoader Carbanak Cobalt Strike DICELOADER Gozi IcedID Lumma Stealer NetSupportManager RAT Pikabot RedLine Stealer SectopRAT Sliver SmokeLoader Vidar |
2024-07-02
⋅
Malsada Tech
⋅
The LandUpdate808 Fake Update Variant FAKEUPDATES |
2024-07-01
⋅
Speakerdeck (takahiro_haruyama)
⋅
The Art of Malware C2 Scanning - How to Reverse and Emulate Protocol Obfuscated by Compiler DOPLUGS Hodur |
2024-06-30
⋅
ZW01f
⋅
Deep Analysis of Snake (404 keylogger) 404 Keylogger |
2024-06-28
⋅
Trend Micro
⋅
Examining Water Sigbin's Infection Routine Leading to an XMRig Cryptominer Water Sigbin |
2024-06-28
⋅
cocomelonc
⋅
Malware development trick 42: Stealing data via legit Discord Bot API. Simple C example. |
2024-06-27
⋅
QuoIntelligence
⋅
Analyzing the Shift in Ransomware Dynamics: The Impact of Law Enforcement and Future Outlooks APT73 |
2024-06-27
⋅
The Cyber Express
⋅
AzzaSec, NoName Cyberattackers Join Hands to Potentially Target Pro-Ukriane Allies AzzaSec |
2024-06-27
⋅
GovCERT.ch
⋅
Poseidon Stealer malspam campaign targeting Swiss macOS users Poseidon Stealer |
2024-06-26
⋅
US Department of Justice
⋅
Russian National Charged for Conspiring with Russian Military Intelligence to Destroy Ukrainian Government Computer Systems and Data WhisperGate |
2024-06-26
⋅
Group-IB
⋅
Craxs Rat, the master tool behind fake app scams and banking fraud CraxsRAT SpyMax SpyNote |
2024-06-26
⋅
edeca.net
⋅
An interesting Callisto YARA rule Callisto |
2024-06-26
⋅
SentinelOne
⋅
ChamelGang & Friends | Cyberespionage Groups Attacking Critical Infrastructure with Ransomware CatB Chamelgang |
2024-06-26
⋅
edeca.net
⋅
An interesting Callisto YARA rule |
2024-06-25
⋅
Hunt.io
⋅
Good Game, Gone Bad: Xeno RAT Spread Via .gg Domains and GitHub XenoRAT |
2024-06-25
⋅
cocomelonc
⋅
Malware development trick 41: Stealing data via legit VirusTotal API. Simple C example. |
2024-06-25
⋅
HiSolutions
⋅
How to detect the modular RAT CSHARP-STREAMER csharp-streamer RAT |
2024-06-25
⋅
Cado Security
⋅
From Dormant to Dangerous: P2Pinfect Evolves to Deploy New Ransomware and Cryptominer P2Pinfect |
2024-06-24
⋅
Recorded Future
⋅
Chinese State-Sponsored RedJuliett Intensifies Taiwanese Cyber Espionage via Network Perimeter Exploitation RedJuliett |
2024-06-24
⋅
CySecurity News
⋅
Infamous Hacker IntelBroker Breaches Apple's Security, Leaks Internal Tool Source Code IntelBroker |