Click here to download all references as Bib-File.•
2024-06-25
⋅
HiSolutions
⋅
How to detect the modular RAT CSHARP-STREAMER csharp-streamer RAT |
2024-06-25
⋅
Cado Security
⋅
From Dormant to Dangerous: P2Pinfect Evolves to Deploy New Ransomware and Cryptominer P2Pinfect |
2024-06-24
⋅
Recorded Future
⋅
Chinese State-Sponsored RedJuliett Intensifies Taiwanese Cyber Espionage via Network Perimeter Exploitation RedJuliett |
2024-06-24
⋅
CySecurity News
⋅
Infamous Hacker IntelBroker Breaches Apple's Security, Leaks Internal Tool Source Code IntelBroker |
2024-06-24
⋅
Kroll
⋅
Novel Technique Combination Used In IDATLOADER Distribution Emmenhtal HijackLoader |
2024-06-24
⋅
SonicWall
⋅
StrelaStealer Resurgence: Tracking a JavaScript-Driven Credential Stealer Targeting Europe StrelaStealer |
2024-06-24
⋅
Malwarebytes Labs
⋅
‘Poseidon’ Mac stealer distributed via Google ads Poseidon Stealer |
2024-06-24
⋅
RevEng.AI
⋅
Latrodectus Affiliate Resumes Operations Using Brute Ratel C4 Post Operation Endgame Brute Ratel C4 Latrodectus |
2024-06-24
⋅
GootLoader Wordpress
⋅
Gootloader’s New Hideout Revealed: The Malware Hunt in WordPress’ Shadows GootLoader |
2024-06-21
⋅
Cisco Talos
⋅
SneakyChef espionage group targets government agencies with SugarGh0st and more infection techniques SneakyChef |
2024-06-21
⋅
Group-IB
⋅
Boolka Unveiled: From web attacks to modular malware BMANAGER Boolka |
2024-06-21
⋅
Malwarebytes Labs
⋅
Was T-Mobile compromised by a zero-day in Jira? IntelBroker |
2024-06-21
⋅
0x1c
⋅
[0001] AmberAmethystDaisy -> QuartzBegonia -> LummaStealer Lumma Stealer |
2024-06-21
⋅
Elastic
⋅
GrimResource - Microsoft Management Console for initial access and evasion Cobalt Strike |
2024-06-20
⋅
DARKReading
⋅
'Vortax' Meeting Software Builds Elaborate Branding, Spreads Infostealers Markopolo |
2024-06-20
⋅
cocomelonc
⋅
Linux malware development 1: Intro to kernel hacking. Simple C example. |
2024-06-20
⋅
Cleafy
⋅
Medusa Reborn: A New Compact Variant Discovered Medusa TangleBot |
2024-06-20
⋅
Hunt.io
⋅
Caught in the Act: Uncovering SpyNote in Unexpected Places SpyNote |
2024-06-19
⋅
Trend Micro
⋅
Behind the Great Wall: Void Arachne Targets Chinese-Speaking Users With the Winos 4.0 C&C Framework ValleyRAT Void Arachne |
2024-06-19
⋅
ANSSI
⋅
Malicious activities linked to the Nobelium intrusion set WINELOADER |