Click here to download all references as Bib-File.•
2024-04-11
⋅
Github (jeFF0Falltrades)
⋅
Rat King Configuration Parser AsyncRAT DCRat Quasar RAT Venom RAT |
2024-04-10
⋅
Github (KekraLoader)
⋅
Leak of Epsilon Stealer's source code Epsilon Stealer |
2024-04-10
⋅
2024-04-10
⋅
XZ Utils Backdoor | Threat Actor Planned to Inject Further Vulnerabilities xzbot |
2024-04-10
⋅
0ffset Blog
⋅
Resolving Stack Strings with Capstone Disassembler & Unicorn in Python Conti |
2024-04-10
⋅
ESET Research
⋅
eXotic Visit campaign: Tracing the footprints of Virtual Invaders XploitSPY |
2024-04-10
⋅
Proofpoint
⋅
Security Brief: TA547 Targets German Organizations with Rhadamanthys Stealer Rhadamanthys |
2024-04-09
⋅
⋅
Israel National Cyber Directorate
⋅
קבוצת התקיפה האיראנית Black Shadow |
2024-04-09
⋅
eSentire
⋅
Unraveling Not AZORult but Koi Loader: A Precursor to Koi Stealer Koi Loader Koi Stealer |
2024-04-09
⋅
Hunt.io
⋅
BlueShell: Four Years On, Still A Formidable Threat BlueShell |
2024-04-09
⋅
Claroty
⋅
Unpacking the Blackjack Group's Fuxnet Malware BlackJack |
2024-04-09
⋅
Immersive Labs
⋅
Havoc C2 Framework – A Defensive Operator’s Guide Havoc |
2024-04-09
⋅
DCSO
⋅
XZ Backdoor: How to check if your systems are affected xzbot |
2024-04-09
⋅
kienmanowar Blog
⋅
[QuickNote] Phishing email distributes WarZone RAT via DBatLoader Ave Maria DBatLoader |
2024-04-08
⋅
0x0d4y
⋅
IcedID – Technical Analysis of an IcedID Lightweight x64 DLL IcedID |
2024-04-08
⋅
Zscaler
⋅
Automating Pikabot’s String Deobfuscation Pikabot |
2024-04-07
⋅
cyber5w
⋅
Gafgyt Backdoor Analysis Bashlite |
2024-04-05
⋅
Heimdal Security
⋅
Powerhost’s ESXi Servers Encrypted with New SEXi Ransomware SEXi SEXi |
2024-04-05
⋅
DARKReading
⋅
Ransomware Desires VMware Hypervisors in Ongoing Campaign SEXi SEXi |
2024-04-04
⋅
Twitter (@BushidoToken)
⋅
Tweet about the SEXi Ransomware attack on IXMETRO POWERHOST SEXi |
2024-04-04
⋅
Mandiant
⋅
Cutting Edge, Part 4: Ivanti Connect Secure VPN Post-Exploitation Lateral Movement Case Studies TONERJAM |