Click here to download all references as Bib-File.•
2024-05-13
⋅
Emerging Threats
⋅
SIGS: W32/Badspace.Backdoor WarmCookie |
2024-05-13
⋅
Malsada Tech
⋅
Gootloader Isn’t Broken GootLoader |
2024-05-13
⋅
ESET Research
⋅
Ebury is alive but unseen: 400k Linux servers compromised for cryptocurrency theft and financial gain Ebury |
2024-05-13
⋅
Recorded Future
⋅
Exploring the Depths of SolarMarker's Multi-tiered Infrastructure solarmarker |
2024-05-11
⋅
Russian APT deploys new 'Kapeka' backdoor in Eastern European attacks Kapeka |
2024-05-10
⋅
⋅
Qianxin Threat Intelligence Center
⋅
Recruitment trap for blockchain practitioners: Analysis of suspected Lazarus (APT-Q-1) stealing operations BeaverTail |
2024-05-10
⋅
Rapid7 Labs
⋅
Ongoing Social Engineering Campaign Linked to Black Basta Ransomware Operators Black Basta Black Basta Cobalt Strike NetSupportManager RAT |
2024-05-10
⋅
CISA
⋅
AA24-131A: #StopRansomware: Black Basta Black Basta Black Basta |
2024-05-10
⋅
Elastic
⋅
Dissecting REMCOS RAT: An in- depth analysis of a widespread 2024 malware, Part Four Remcos |
2024-05-09
⋅
Meterpreter
⋅
Cybersecurity Firm Hacked: Sensitive Data on Sale IntelBroker |
2024-05-09
⋅
0x0d4y
⋅
[Case Study: Latrodectus] Analyzing and Implementing String Decryption Algorithms Latrodectus |
2024-05-08
⋅
Mandiant
⋅
M-Trends 2024 Special Report: Chinese Espionage Operations Targeting The Visibility Gap BOLDMOVE WHIRLPOOL |
2024-05-08
⋅
Medium (montysecurity)
⋅
From OSINT to Disk: Wave Stealer Analysis Wave Stealer |
2024-05-08
⋅
Elastic
⋅
Elastic Security - WarmCookie YARA Rule WarmCookie |
2024-05-08
⋅
CERT.PL
⋅
APT28 campaign targeting Polish government institutions Headlace |
2024-05-07
⋅
Elastic
⋅
Elastic Security - GhostEngine YARA Rule win.ghostengine |
2024-05-07
⋅
Twitter (@fs0c131y)
⋅
Tweets on LockBitSupp LockBit |
2024-05-07
⋅
KrebsOnSecurity
⋅
U.S. Charges Russian Man as Boss of LockBit Ransomware Group LockBit |
2024-05-07
⋅
AhnLab
⋅
LNK File Disguised as Certificate Distributing RokRAT Malware RokRAT |
2024-05-07
⋅
⋅
Gatewatcher
⋅
Cybercrime's Anatomy Threats to the Healthcare World |