Click here to download all references as Bib-File.•
2023-08-10
⋅
Avast Decoded
⋅
Unveiling the Dominance of Scams Amidst a 24% Surge in Blocked Attacks Storm-1567 |
2023-08-07
⋅
Team Cymru
⋅
Visualizing Qakbot Infrastructure Part II: Uncharted Territory QakBot |
2023-07-28
⋅
Team Cymru
⋅
Inside the IcedID BackConnect Protocol (Part 2) IcedID |
2023-07-25
⋅
splunk
⋅
Amadey Threat Analysis and Detections Amadey |
2023-07-19
⋅
secrss
⋅
Military topics become the focus: The threat of fake hunter APT organizations continues to be exposed |
2023-07-08
⋅
Blackberry
⋅
RomCom Threat Actor Suspected of Targeting Ukraine's NATO Membership Talks at the NATO Summit ROMCOM RAT |
2023-07-04
⋅
Russian Panda Research Blog
⋅
Unleashing the Viper : A Technical Analysis of WhiteSnake Stealer WhiteSnake Stealer |
2023-06-29
⋅
Avast Decoded
⋅
Decrypted: Akira Ransomware Akira |
2023-06-28
⋅
BI. ZONE Cyber Threats Research Team
⋅
Red Wolf is back to spy on commercial firms Red Wolf is back to spy on commercial firms RedCurl |
2023-06-23
⋅
Phylum
⋅
Phylum Discovers Sophisticated Ongoing Attack on NPM |
2023-06-21
⋅
Elastic
⋅
Initial research exposing JOKERSPY JokerSpy |
2023-06-15
⋅
Team Cymru
⋅
Darth Vidar: The Aesir Strike Back Vidar |
2023-05-25
⋅
cyble
⋅
Invicta Stealer Spreading Through Phony GoDaddy Refund Invoices Invicta Stealer |
2023-05-08
⋅
Blackberry
⋅
SideWinder Uses Server-side Polymorphism to Attack Pakistan Government Officials — and Is Now Targeting Turkey |
2023-04-19
⋅
Team Cymru
⋅
AllaKore(d) the SideCopy Train AllaKore |
2023-04-04
⋅
Team Cymru
⋅
A Blog with NoName Dosia |
2023-03-31
⋅
Blackberry
⋅
Initial Implants and Network Analysis Suggest the 3CX Supply Chain Operation Goes Back to Fall 2022 3CX Backdoor |
2023-03-31
⋅
splunk
⋅
Splunk Insights: Investigating the 3CXDesktopApp Supply Chain Compromise 3CX Backdoor |
2023-03-29
⋅
CrowdStrike
⋅
CrowdStrike Falcon Platform Detects and Prevents Active Intrusion Campaign Targeting 3CXDesktopApp Customers 3CX Backdoor |
2023-03-28
⋅
ThreatMon
⋅
Chinotto Backdoor Technical Analysis of the APT Reaper’s Powerful Weapon Chinotto |