Click here to download all references as Bib-File.•
2024-05-16
⋅
⋅
AhnLab
⋅
Analysis of APT attack cases targeting domestic companies using Dora RAT (Andariel Group) |
2024-05-16
⋅
Elastic
⋅
Spring Cleaning with LATRODECTUS: A Potential Replacement for ICEDID IcedID Latrodectus |
2024-05-16
⋅
Symantec
⋅
Springtail: New Linux Backdoor Added to Toolkit Gomir Kimsuky |
2024-05-16
⋅
ANY.RUN
⋅
Malware trend: Latrodectus Latrodectus |
2024-05-15
⋅
Microsoft
⋅
Threat actors misusing Quick Assist in social engineering attacks leading to ransomware Black Basta Cobalt Strike QakBot SystemBC |
2024-05-15
⋅
ESET Research
⋅
To the Moon and back(doors): Lunar landing in diplomatic missions LunarMail |
2024-05-15
⋅
Stairwell
⋅
Stairwell threat report: Black Basta overview and detection rules Black Basta Black Basta |
2024-05-15
⋅
Microsoft
⋅
Threat actors misusing Quick Assist in social engineering attacks leading to ransomware Black Basta Cobalt Strike QakBot UNC4393 |
2024-05-14
⋅
Darkowl
⋅
What are CVEs? Ukrainian Cyber Alliance |
2024-05-14
⋅
Check Point Research
⋅
Foxit PDF “Flawed Design” Exploitation Rafel RAT Agent Tesla AsyncRAT DCRat DONOT Nanocore RAT NjRAT Pony Remcos Venom RAT XWorm |
2024-05-14
⋅
Kaspersky
⋅
QakBot attacks with Windows zero-day (CVE-2024-30051) Cobalt Strike QakBot |
2024-05-14
⋅
S-RM
⋅
Breaking new ground? Uncovering Akira's privilege escalation techniques Akira |
2024-05-13
⋅
Emerging Threats
⋅
SIGS: W32/Badspace.Backdoor WarmCookie |
2024-05-11
⋅
Russian APT deploys new 'Kapeka' backdoor in Eastern European attacks Kapeka |
2024-05-10
⋅
⋅
Qianxin Threat Intelligence Center
⋅
Recruitment trap for blockchain practitioners: Analysis of suspected Lazarus (APT-Q-1) stealing operations BeaverTail |
2024-05-10
⋅
Rapid7 Labs
⋅
Ongoing Social Engineering Campaign Linked to Black Basta Ransomware Operators Black Basta Black Basta Cobalt Strike NetSupportManager RAT |
2024-05-10
⋅
Elastic
⋅
Dissecting REMCOS RAT: An in- depth analysis of a widespread 2024 malware, Part Four Remcos |
2024-05-09
⋅
Meterpreter
⋅
Cybersecurity Firm Hacked: Sensitive Data on Sale IntelBroker |
2024-05-09
⋅
0x0d4y
⋅
[Case Study: Latrodectus] Analyzing and Implementing String Decryption Algorithms Latrodectus |
2024-05-08
⋅
Mandiant
⋅
M-Trends 2024 Special Report: Chinese Espionage Operations Targeting The Visibility Gap BOLDMOVE WHIRLPOOL |