Click here to download all references as Bib-File.•
2024-06-25
⋅
Cado Security
⋅
From Dormant to Dangerous: P2Pinfect Evolves to Deploy New Ransomware and Cryptominer P2Pinfect |
2024-06-24
⋅
Recorded Future
⋅
Chinese State-Sponsored RedJuliett Intensifies Taiwanese Cyber Espionage via Network Perimeter Exploitation RedJuliett |
2024-06-24
⋅
Kroll
⋅
Novel Technique Combination Used In IDATLOADER Distribution Emmenhtal HijackLoader |
2024-06-24
⋅
RevEng.AI
⋅
Latrodectus Affiliate Resumes Operations Using Brute Ratel C4 Post Operation Endgame Brute Ratel C4 Latrodectus |
2024-06-21
⋅
Group-IB
⋅
Boolka Unveiled: From web attacks to modular malware BMANAGER Boolka |
2024-06-20
⋅
Red Canary
⋅
Gourav Khandelwal, Akash Chaudhuri, Matthew Mesa, Sagar Patil, Uri Oren, Krithika Ramakrishnan UNC4393 |
2024-06-20
⋅
DARKReading
⋅
'Vortax' Meeting Software Builds Elaborate Branding, Spreads Infostealers Markopolo |
2024-06-20
⋅
Cleafy
⋅
Medusa Reborn: A New Compact Variant Discovered Medusa TangleBot |
2024-06-19
⋅
Fortinet
⋅
Fickle Stealer Distributed via Multiple Attack Chain Fickle Stealer |
2024-06-19
⋅
Trend Micro
⋅
Behind the Great Wall: Void Arachne Targets Chinese-Speaking Users With the Winos 4.0 C&C Framework ValleyRAT Void Arachne |
2024-06-19
⋅
Medium walmartglobaltech
⋅
Spectre (SPC) v9 Campaigns and Updates Spectre Rat |
2024-06-19
⋅
AT&T
⋅
LevelBlue Labs Discovers Highly Evasive, New Loader Targeting Chinese Organizations SquidLoader |
2024-06-18
⋅
Mandiant
⋅
Cloaked and Covert: Uncovering UNC3886 Espionage Operations |
2024-06-17
⋅
splunk
⋅
LNK or Swim: Analysis & Simulation of Recent LNK Phishing |
2024-06-17
⋅
Checkpoint
⋅
17th June – Threat Intelligence Report Sp1d3r UNC5537 |
2024-06-17
⋅
CySecurity News
⋅
Truist Bank Confirms Data Breach After Information Surfaces on Hacking Forum Sp1d3r |
2024-06-17
⋅
Recorded Future
⋅
The Travels of “markopolo”: Self-Proclaimed Meeting Software Vortax Spreads Infostealers, Unveils Expansive Network of Malicious macOS Applications AMOS Rhadamanthys Stealc Markopolo |
2024-06-17
⋅
Trellix
⋅
Info Stealing Campaign Uses DLL Sideloading Through Legitimate Cisco Webex’s Binaries for Initial Execution and Defense Evasion HijackLoader Lumma Stealer |
2024-06-17
⋅
BitSight
⋅
Latrodectus are you coming back Latrodectus |
2024-06-16
⋅
cocomelonc
⋅
Malware development trick 40: Stealing data via legit Telegram API. Simple C example. |