Click here to download all references as Bib-File.•
2024-06-19
⋅
AT&T
⋅
LevelBlue Labs Discovers Highly Evasive, New Loader Targeting Chinese Organizations SquidLoader |
2024-06-18
⋅
Mandiant
⋅
Cloaked and Covert: Uncovering UNC3886 Espionage Operations |
2024-06-17
⋅
splunk
⋅
LNK or Swim: Analysis & Simulation of Recent LNK Phishing |
2024-06-17
⋅
Checkpoint
⋅
17th June – Threat Intelligence Report Sp1d3r UNC5537 |
2024-06-17
⋅
CySecurity News
⋅
Truist Bank Confirms Data Breach After Information Surfaces on Hacking Forum Sp1d3r |
2024-06-17
⋅
Recorded Future
⋅
The Travels of “markopolo”: Self-Proclaimed Meeting Software Vortax Spreads Infostealers, Unveils Expansive Network of Malicious macOS Applications AMOS Rhadamanthys Stealc Markopolo |
2024-06-17
⋅
medium Andrew Petus
⋅
Reverse Engineering Redosdru String Decryption Redosdru |
2024-06-17
⋅
Trellix
⋅
Info Stealing Campaign Uses DLL Sideloading Through Legitimate Cisco Webex’s Binaries for Initial Execution and Defense Evasion HijackLoader Lumma Stealer |
2024-06-17
⋅
Proofpoint
⋅
From Clipboard to Compromise: A PowerShell Self-Pwn DarkGate HijackLoader Lumma Stealer Matanbuchus NetSupportManager RAT TA571 |
2024-06-17
⋅
BitSight
⋅
Latrodectus are you coming back Latrodectus |
2024-06-17
⋅
Rapid7
⋅
Malvertising Campaign Leads to Execution of Oyster Backdoor Broomstick ChrGetPdsi Stealer |
2024-06-16
⋅
cocomelonc
⋅
Malware development trick 40: Stealing data via legit Telegram API. Simple C example. |
2024-06-15
⋅
Medium b.magnezi
⋅
Malware Analysis FormBook Formbook |
2024-06-13
⋅
IT Security Guru
⋅
Guest Blog: Ox Security on learning from the Recent GitHub Extortion Campaigns Gitloker |
2024-06-13
⋅
Github (LambdaMamba)
⋅
Implementation of C2 decryption PrivateLoader |
2024-06-13
⋅
Github (LambdaMamba)
⋅
Implementation of a Config Decryptor for Amadey Amadey |
2024-06-13
⋅
Cisco Talos
⋅
Operation Celestial Force employs mobile and desktop malware to target Indian entities Gravity RAT Gravity RAT |
2024-06-13
⋅
Medium (@zyadlzyatsoc)
⋅
Inside LATRODECTUS: A Dive into Malware Tactics and Mitigation Latrodectus |
2024-06-13
⋅
Volexity
⋅
DISGOMOJI Malware Used to Target Indian Government |
2024-06-12
⋅
Google
⋅
Insights on Cyber Threats Targeting Users and Enterprises in Brazil TraderTraitor |