Click here to download all references as Bib-File.•
2024-11-13
⋅
TEHTRIS
⋅
Cracking Formbook malware: Blind deobfuscation and quick response techniques Formbook |
2024-11-13
⋅
Bitdefender
⋅
ShrinkLocker (+Decryptor): From Friend to Foe, and Back Again |
2024-11-12
⋅
Blackberry
⋅
LightSpy: APT41 Deploys Advanced DeepData Framework In Targeted Southern Asia Espionage Campaign DEEPDATA |
2024-11-12
⋅
Qianxin
⋅
New Zero-Detection Variant of Melofee Backdoor from Winnti Strikes RHEL 7.9 Melofee |
2024-11-12
⋅
SecurityScorecard
⋅
The Botnet is Back: SSC STRIKE Team Uncovers a Renewed Cyber Threat |
2024-11-12
⋅
DataBreaches.net
⋅
Amazon confirms employee data breach after vendor hack Nam3L3ss |
2024-11-08
⋅
⋅
Rostelecom-Solar
⋅
The Elusive GoblinRAT – The Story Behind the Most Secretive and Mysterious Linux Backdoor Found in Government Infrastructures |
2024-11-08
⋅
RedPacket Security
⋅
[APT73] – Ransomware Victim: www[.]baldinger-ag[.]ch APT73 |
2024-11-07
⋅
Cisco Talos
⋅
Unwrapping the emerging Interlock ransomware attack Rhysida |
2024-11-07
⋅
ESET Research
⋅
APT Activity Report: Abusing Cloud Services and VPN Platforms in the Pursuit of New Prey FrostyNeighbor |
2024-11-06
⋅
Cloudsek
⋅
Mozi Resurfaces as Androxgh0st Botnet: Unraveling The Latest Exploitation Wave Mozi |
2024-11-06
⋅
YouTube ( Hexacon)
⋅
Caught in the wild - Past, present and future |
2024-11-06
⋅
Kaspersky Labs
⋅
New SteelFox Trojan mimics software activators, stealing sensitive data and mining cryptocurrency |
2024-11-05
⋅
Hunt.io
⋅
RunningRAT’s Next Move: From Remote Access to Crypto Mining for Profit Running RAT |
2024-11-04
⋅
Securonix
⋅
CRON#TRAP: Emulated Linux Environments as the Latest Tactic in Malware Staging Chisel |
2024-11-01
⋅
LevelBlue
⋅
Ngioweb Remains Active 7 Years Later Ngioweb |
2024-10-31
⋅
Twitter (@MonThreat)
⋅
Tweet about EvilByte claiming to have hacked MyFatoorah Evilbyte |
2024-10-31
⋅
Sophos X-Ops
⋅
Pacific Rim: Inside the Counter-Offensive—The TTPs Used to Neutralize China-Based Threats Asnarök |
2024-10-31
⋅
Sophos X-Ops
⋅
Pacific Rim timeline: Information for defenders from a braid of interlocking attack campaigns Asnarök Tstark |
2024-10-31
⋅
Microsoft
⋅
Chinese threat actor Storm-0940 uses credentials from password spray attacks from a covert network Storm-0940 |