Click here to download all references as Bib-File.•
2021-04-19
⋅
nviso
⋅
How to analyze mobile malware: a Cabassous/FluBot Case study FluBot |
2021-04-19
⋅
Youtube (AhmedS Kasmani)
⋅
Malware Analysis of a Password Stealer Poulight Stealer |
2021-04-19
⋅
Washington Examiner
⋅
Inside the CIA and NSA disagreement over Russian bounties story |
2021-04-19
⋅
Anomali
⋅
PRIMITIVE BEAR (Gamaredon) Targets Ukraine with Timely Themes |
2021-04-19
⋅
NEW YORKER
⋅
The Incredible Rise of North Korea’s Hacking Army |
2021-04-19
⋅
Sentinel LABS
⋅
A Deep Dive into Zebrocy’s Dropper Docs Downdelph |
2021-04-19
⋅
InfoSec Handlers Diary Blog
⋅
Hunting phishing websites with favicon hashes |
2021-04-19
⋅
Twitter (@_alex_il_)
⋅
Tweet on QakBot's additional decryption mechanism QakBot |
2021-04-19
⋅
Intel 471
⋅
How China’s cybercrime underground is making money off big data |
2021-04-19
⋅
Netresec
⋅
Analysing a malware PCAP with IcedID and Cobalt Strike traffic Cobalt Strike IcedID |
2021-04-19
⋅
Medium elis531989
⋅
Dancing With Shellcodes: Cracking the latest version of Guloader CloudEyE |
2021-04-19
⋅
CERT NZ
⋅
Microsoft 365 phishing using fake voicemail messages |
2021-04-18
⋅
Bleeping Computer
⋅
Discord Nitro gift codes now demanded as ransomware payments Nitro |
2021-04-18
⋅
BBC
⋅
1. Hacking Hollywood |
2021-04-18
⋅
Anchored Narratives on Threat Intelligence and Geopolitics
⋅
Recover your files with StrongPity StrongPity |
2021-04-18
⋅
xorl %eax, %eax
⋅
US Cyber Operations Groups |
2021-04-18
⋅
YouTube (dist67)
⋅
Decoding Cobalt Strike Traffic Cobalt Strike |
2021-04-18
⋅
Twitter (@ViriBack)
⋅
Tweet on Seth Loader |
2021-04-17
⋅
YouTube (Worcester DEFCON Group)
⋅
Inside IcedID: Anatomy Of An Infostealer IcedID |
2021-04-17
⋅
Gru.gq
⋅
SVR snaps back at Biden |