Click here to download all references as Bib-File.•
2024-02-15
⋅
DNSC
⋅
Backmydata Ransomware Phobos |
2024-02-15
⋅
Bleeping Computer
⋅
Zeus, IcedID malware gangs leader pleads guilty, faces 40 years in prison Egregor IcedID Maze Zeus |
2024-02-14
⋅
K7 Security
⋅
Zloader Strikes Back Zloader |
2024-02-13
⋅
Proofpoint
⋅
Bumblebee Buzzes Back in Black BumbleBee |
2024-02-12
⋅
Estrellas's Blog
⋅
Unveiling custom packers: A comprehensive guide Dridex Simda |
2024-02-11
⋅
Estrellas's Blog
⋅
Unpacking an Emotet trojan Emotet |
2024-02-09
⋅
Hunt.io
⋅
Tracking ShadowPad Infrastructure Via Non-Standard Certificates ShadowPad |
2024-02-09
⋅
Department of Justice
⋅
International Cybercrime Malware Service Dismantled by Federal Authorities: Key Malware Sales and Support Actors in Malta and Nigeria Charged in Federal Indictments Ave Maria |
2024-02-09
⋅
YouTube (Invoke RE)
⋅
Analyzing and Unpacking Qakbot Using Binary Ninja Automation Part 2 QakBot |
2024-02-09
⋅
Censys
⋅
A Beginners Guide to Tracking Malware Infrastructure AsyncRAT BianLian Cobalt Strike QakBot |
2024-02-08
⋅
Cisco Talos
⋅
New Zardoor backdoor used in long-term cyber espionage operation targeting an Islamic organization HTran reGeorg Venom Proxy ZarDoor |
2024-02-08
⋅
Cybercrime Diaries
⋅
Russian Language Cybercriminal Forums – Analyzing The Most Active And Renowned Communities. Raccoon RecordBreaker |
2024-02-08
⋅
YouTube (Embee Research)
⋅
Cobalt Strike Decoding and C2 Extraction - 3 Minute Malware Analysis Speedrun Cobalt Strike |
2024-02-07
⋅
Lumen
⋅
KV-Botnet: Don’t call it a Comeback KV |
2024-02-07
⋅
Malwarebytes
⋅
How to tell if your toothbrush is being used in a DDoS attack |
2024-02-07
⋅
CrowdStrike
⋅
HijackLoader Expands Techniques to Improve Defense Evasion HijackLoader |
2024-02-07
⋅
CISA
⋅
PRC State-Sponsored Actors Compromise and Maintain Persistent Access to U.S. Critical Infrastructure ScanLine |
2024-02-06
⋅
Knownsec
⋅
APT-K-47 Organization Launches Espionage Attacks Using a New Trojan Tool Nimbo-C2 ORPCBackdoor |
2024-02-06
⋅
Knownsec
⋅
APT-K-47 Organization Launches Espionage Attacks Using a New Trojan Tool Nimbo-C2 ORPCBackdoor |
2024-02-06
⋅
Group-IB
⋅
Dead-end job: ResumeLooters gang infects websites with XSS scripts and SQL injections to vacuum up job seekers' personal data and CVs ResumeLooters |