Click here to download all references as Bib-File.•
2024-05-07
⋅
⋅
Gatewatcher
⋅
Cybercrime's Anatomy Threats to the Healthcare World |
2024-05-06
⋅
Security Affairs
⋅
El Salvador suffered a massive leak of biometric data CiberInteligenciaSV |
2024-05-06
⋅
Zscaler
⋅
HijackLoader Updates HijackLoader |
2024-05-06
⋅
Cyber-Forensics
⋅
Agent Tesla Malware Analysis Agent Tesla |
2024-05-05
⋅
Github (VenzoV)
⋅
Latrodectus "littlehw" Latrodectus |
2024-05-04
⋅
Risk Associates
⋅
191 Australian Organizations affected by ZircoDATA Breach Linked to Russian Ransomware Gang |
2024-05-04
⋅
Medium MITRE-Engenuity
⋅
Technical Deep Dive: Understanding the Anatomy of a Cyber Intrusion WIREFIRE |
2024-05-03
⋅
Aqua Nautilus
⋅
Kinsing Demystified: A Comprehensive Technical Guide Kinsing |
2024-05-03
⋅
Elastic
⋅
Dissecting REMCOS RAT: An in- depth analysis of a widespread 2024 malware, Part Three Remcos |
2024-05-02
⋅
calif.io
⋅
Dissecting LOCKBIT v3 ransomware LockBit |
2024-05-01
⋅
Trend Micro
⋅
Router Roulette: Cybercriminals and Nation-States Sharing Compromised Networks Ngioweb SSHDoor |
2024-05-01
⋅
⋅
Macnica
⋅
The Reality of Targeted Attacks and Countermeasures: Trends in Cyber Espionage (Targeted Attacks) Targeting Japan FY2023 LODEINFO NOOPDOOR |
2024-05-01
⋅
Microsoft
⋅
“Dirty stream” attack: Discovering and mitigating a common vulnerability pattern in Android apps |
2024-05-01
⋅
Natto Thoughts
⋅
Ransom-War: Russian Extortion Operations as Hybrid Warfare, Part One Clop Conti Maze TrickBot |
2024-04-30
⋅
Intrinsec
⋅
Matanbuchus & Co: Code Emulation and Cybercrime Infrastructure Discovery FAKEUPDATES Matanbuchus |
2024-04-30
⋅
Elastic
⋅
Dissecting REMCOS RAT: An in- depth analysis of a widespread 2024 malware, Part Two Remcos |
2024-04-30
⋅
Trellix
⋅
Pouring Acid Rain AcidPour AcidRain |
2024-04-30
⋅
0x0d4y
⋅
Latrodectus [IceNova] – Technical Analysis of the… New IcedID… Its Continuation… Or its Replacement? Latrodectus |
2024-04-29
⋅
cyber5w
⋅
How to unpack Death Ransomware DeathRansom |
2024-04-29
⋅
ThreatMon
⋅
Understanding the 'Kapeka' Backdoor: Detailed Analysis by APT44 Kapeka |