Click here to download all references as Bib-File.•
2024-03-29
⋅
CISA
⋅
Reported Supply Chain Compromise Affecting XZ Utils Data Compression Library, CVE-2024-3094 xzbot |
2024-03-29
⋅
Github (thesamsam)
⋅
Gist with XZ Backdoor analysis xzbot |
2024-03-29
⋅
Openwall
⋅
Initial email disclosing suspected backdoor in xz tarballs xzbot |
2024-03-29
⋅
Github (VenzoV)
⋅
GCleaner analysis with BinaryNinja GCleaner |
2024-03-29
⋅
Elastic
⋅
In- the- Wild Windows LPE 0- days: Insights & Detection Strategies |
2024-03-28
⋅
Fox-IT
⋅
Android Malware Vultur Expands Its Wingspan Brunhilda Vultur |
2024-03-27
⋅
dissect.ing
⋅
Analyzing the new Donex Ransomware Donex |
2024-03-27
⋅
EclecticIQ
⋅
Operation FlightNight: Indian Government Entities and Energy Sector Targeted by Cyber Espionage Campaign HackBrowserData |
2024-03-27
⋅
Twitter (@embee_research)
⋅
Uncovering Malicious Infrastructure with DNS Pivoting LokiBot XWorm |
2024-03-26
⋅
Medium zyadlzyatsoc
⋅
Comprehensive Analysis of EMOTET Malware: Part 1 Emotet |
2024-03-26
⋅
K7 Security
⋅
Unknown TTPs of Remcos RAT Remcos |
2024-03-26
⋅
Palo Alto Networks Unit 42
⋅
ASEAN Entities in the Spotlight: Chinese APT Group Targeting PUBLOAD |
2024-03-26
⋅
Lumen
⋅
The Darkside Of TheMoon TheMoon |
2024-03-26
⋅
EchoCTI
⋅
Agent Tesla Technical Analysis Report Agent Tesla |
2024-03-25
⋅
ANY.RUN
⋅
Reverse Engineering Snake Keylogger: Full .NET Malware Analysis Walkthrough 404 Keylogger GaboonGrabber |
2024-03-25
⋅
Github (veo)
⋅
vshell Vshell |
2024-03-25
⋅
embeeresearch
⋅
Latrodectus Deobfuscation - Removal of Junk Comments and Self-Referencing Code Latrodectus |
2024-03-25
⋅
iVerify
⋅
Clipping Wings: Our Analysis of a Pegasus Spyware Sample Chrysaor |
2024-03-24
⋅
Securonix
⋅
Analysis of DEV#POPPER: New Attack Campaign Targeting Software Developers Likely Associated With North Korean Threat Actors BeaverTail |
2024-03-24
⋅
Viuleeenz
⋅
Understanding API Hashing and build a rainbow table for LummaStealer Lumma Stealer |