Click here to download all references as Bib-File.•
2024-06-30
⋅
ZW01f
⋅
Deep Analysis of Snake (404 keylogger) 404 Keylogger |
2024-06-28
⋅
cocomelonc
⋅
Malware development trick 42: Stealing data via legit Discord Bot API. Simple C example. |
2024-06-27
⋅
Palo Alto Networks Unit 42
⋅
Threat Actor Groups Tracked by Palo Alto Networks Unit 42 GOLD REBELLION |
2024-06-27
⋅
QuoIntelligence
⋅
Analyzing the Shift in Ransomware Dynamics: The Impact of Law Enforcement and Future Outlooks APT73 |
2024-06-27
⋅
The Cyber Express
⋅
AzzaSec, NoName Cyberattackers Join Hands to Potentially Target Pro-Ukriane Allies AzzaSec |
2024-06-26
⋅
US Department of Justice
⋅
Russian National Charged for Conspiring with Russian Military Intelligence to Destroy Ukrainian Government Computer Systems and Data WhisperGate |
2024-06-26
⋅
Group-IB
⋅
Craxs Rat, the master tool behind fake app scams and banking fraud CraxsRAT SpyMax SpyNote |
2024-06-26
⋅
SentinelOne
⋅
ChamelGang & Friends | Cyberespionage Groups Attacking Critical Infrastructure with Ransomware CatB Chamelgang |
2024-06-25
⋅
cocomelonc
⋅
Malware development trick 41: Stealing data via legit VirusTotal API. Simple C example. |
2024-06-24
⋅
Recorded Future
⋅
Chinese State-Sponsored RedJuliett Intensifies Taiwanese Cyber Espionage via Network Perimeter Exploitation RedJuliett |
2024-06-24
⋅
CySecurity News
⋅
Infamous Hacker IntelBroker Breaches Apple's Security, Leaks Internal Tool Source Code IntelBroker |
2024-06-24
⋅
Kroll
⋅
Novel Technique Combination Used In IDATLOADER Distribution Emmenhtal HijackLoader |
2024-06-24
⋅
SonicWall
⋅
StrelaStealer Resurgence: Tracking a JavaScript-Driven Credential Stealer Targeting Europe StrelaStealer |
2024-06-21
⋅
Cisco Talos
⋅
SneakyChef espionage group targets government agencies with SugarGh0st and more infection techniques SneakyChef |
2024-06-21
⋅
Group-IB
⋅
Boolka Unveiled: From web attacks to modular malware BMANAGER Boolka |
2024-06-20
⋅
Red Canary
⋅
Gourav Khandelwal, Akash Chaudhuri, Matthew Mesa, Sagar Patil, Uri Oren, Krithika Ramakrishnan UNC4393 |
2024-06-20
⋅
DARKReading
⋅
'Vortax' Meeting Software Builds Elaborate Branding, Spreads Infostealers Markopolo |
2024-06-20
⋅
SOCRadar
⋅
Dark Web Profile: SpaceBears SpaceBears |
2024-06-20
⋅
cocomelonc
⋅
Linux malware development 1: Intro to kernel hacking. Simple C example. |
2024-06-19
⋅
Fortinet
⋅
Fickle Stealer Distributed via Multiple Attack Chain Fickle Stealer |