Click here to download all references as Bib-File.•
2024-05-09
⋅
Meterpreter
⋅
Cybersecurity Firm Hacked: Sensitive Data on Sale IntelBroker |
2024-05-08
⋅
Medium (montysecurity)
⋅
From OSINT to Disk: Wave Stealer Analysis Wave Stealer |
2024-05-08
⋅
Elastic
⋅
Elastic Security - WarmCookie YARA Rule WarmCookie |
2024-05-07
⋅
Twitter (@fs0c131y)
⋅
Tweets on LockBitSupp LockBit |
2024-05-07
⋅
KrebsOnSecurity
⋅
U.S. Charges Russian Man as Boss of LockBit Ransomware Group LockBit |
2024-05-07
⋅
AhnLab
⋅
LNK File Disguised as Certificate Distributing RokRAT Malware RokRAT |
2024-05-06
⋅
Security Affairs
⋅
El Salvador suffered a massive leak of biometric data CiberInteligenciaSV |
2024-05-06
⋅
Zscaler
⋅
HijackLoader Updates HijackLoader |
2024-05-04
⋅
Risk Associates
⋅
191 Australian Organizations affected by ZircoDATA Breach Linked to Russian Ransomware Gang |
2024-05-03
⋅
Aqua Nautilus
⋅
Kinsing Demystified: A Comprehensive Technical Guide Kinsing |
2024-05-02
⋅
calif.io
⋅
Dissecting LOCKBIT v3 ransomware LockBit |
2024-05-01
⋅
Mandiant
⋅
Uncharmed: Untangling Iran's APT42 Operations TAMECAT |
2024-05-01
⋅
Trend Micro
⋅
Router Roulette: Cybercriminals and Nation-States Sharing Compromised Networks Ngioweb SSHDoor |
2024-05-01
⋅
⋅
Macnica
⋅
The Reality of Targeted Attacks and Countermeasures: Trends in Cyber Espionage (Targeted Attacks) Targeting Japan FY2023 LODEINFO NOOPDOOR |
2024-05-01
⋅
Microsoft
⋅
“Dirty stream” attack: Discovering and mitigating a common vulnerability pattern in Android apps |
2024-04-30
⋅
Trellix
⋅
Pouring Acid Rain AcidPour AcidRain |
2024-04-29
⋅
cyber5w
⋅
How to unpack Death Ransomware DeathRansom |
2024-04-29
⋅
ThreatMon
⋅
Understanding the 'Kapeka' Backdoor: Detailed Analysis by APT44 Kapeka |
2024-04-29
⋅
Twitter (@sekoia_io)
⋅
@sekoia_io's tweet about the (not so) new infostealer, named ACR Stealer ACR Stealer |
2024-04-29
⋅
Zscaler
⋅
Zloader Learns Old Tricks Zloader |