Click here to download all references as Bib-File.•
2025-02-24
⋅
SecurityScorecard
⋅
Massive Botnet Targets M365 with Stealthy Password Spraying Attacks |
2025-02-24
⋅
Intel 471
⋅
Android trojan TgToxic updates its capabilities TgToxic |
2025-02-24
⋅
cocomelonc
⋅
Malware development trick 45: hiding and extracting payload in PNGs (with cats). Simple C example. OceanLotus DuQu StegoLoader |
2025-02-24
⋅
K7 Security
⋅
LCRYX Ransomware: How a VB Ransomware Locks Your System LCRYX |
2025-02-24
⋅
Kaspersky Labs
⋅
The GitVenom campaign: cryptocurrency theft using GitHub AsyncRAT Quasar RAT |
2025-02-24
⋅
Medium SlowMist
⋅
Cryptocurrency APT Intelligence: Unveiling Lazarus Group’s Intrusion Techniques |
2025-02-23
⋅
The Guardian
⋅
Hackers steal $1.5bn from crypto exchange in ‘biggest digital heist ever’ |
2025-02-23
⋅
Github (albertzsigovits)
⋅
ToxicEye RAT config extraction and YARA signatures ToxicEye |
2025-02-22
⋅
CrowdStrike
⋅
Curly Spider UNC4393 |
2025-02-22
⋅
CrowdStrike
⋅
Wandering Spider Black Basta Black Basta GOLD REBELLION |
2025-02-22
⋅
Cointelegraph
⋅
Lazarus Group moves funds to multiple wallets as Bybit offers bounty |
2025-02-21
⋅
Medium SarvivaMalwareAnalyst
⋅
Process Hollowing — Malware Reverse Engineering. |
2025-02-21
⋅
SonicWall
⋅
Remcos RAT Targets Europe: New AMSI and ETW Evasion Tactics Uncovered Remcos |
2025-02-21
⋅
Kaspersky Labs
⋅
Angry Likho: Old beasts in a new forest Lumma Stealer Angry Likho |
2025-02-21
⋅
TRM Labs
⋅
TRM Links North Korea to Record $1.5 Billion Record Hack |
2025-02-21
⋅
Twitter (@salmanvsf)
⋅
Tweet about VXPCrypter |
2025-02-20
⋅
Hunt.io
⋅
LightSpy Expands Command List to Include Social Media Platforms lightSpy |
2025-02-20
⋅
Trend Micro
⋅
Updated Shadowpad Malware Leads to Ransomware Deployment EvilExtractor PlugX ShadowPad Teleboyi |
2025-02-20
⋅
Cisco Talos
⋅
Weathering the storm: In the midst of a Typhoon |
2025-02-20
⋅
Cyber Triage
⋅
WMI Malware: The Complete Forensics Guide ShrinkLocker |