Click here to download all references as Bib-File.•
| 2024-02-08
⋅
YouTube (Embee Research)
⋅
Cobalt Strike Decoding and C2 Extraction - 3 Minute Malware Analysis Speedrun Cobalt Strike |
| 2024-02-07
⋅
Lumen
⋅
KV-Botnet: Don’t call it a Comeback KV |
| 2024-02-07
⋅
Malwarebytes
⋅
How to tell if your toothbrush is being used in a DDoS attack |
| 2024-02-07
⋅
CrowdStrike
⋅
HijackLoader Expands Techniques to Improve Defense Evasion HijackLoader |
| 2024-02-07
⋅
CISA
⋅
PRC State-Sponsored Actors Compromise and Maintain Persistent Access to U.S. Critical Infrastructure ScanLine |
| 2024-02-06
⋅
Knownsec
⋅
APT-K-47 Organization Launches Espionage Attacks Using a New Trojan Tool Nimbo-C2 ORPCBackdoor |
| 2024-02-06
⋅
Knownsec
⋅
APT-K-47 Organization Launches Espionage Attacks Using a New Trojan Tool Nimbo-C2 ORPCBackdoor |
| 2024-02-06
⋅
Group-IB
⋅
Dead-end job: ResumeLooters gang infects websites with XSS scripts and SQL injections to vacuum up job seekers' personal data and CVs ResumeLooters |
| 2024-02-06
⋅
The Hacker News
⋅
Beware: Fake Facebook Job Ads Spreading 'Ov3r_Stealer' to Steal Crypto and Credentials CrackedCantil Phemedrone Stealer |
| 2024-02-06
⋅
Trustwave
⋅
Facebook Advertising Spreads Novel Malware Variant Phemedrone Stealer |
| 2024-02-05
⋅
Reuters
⋅
Philippines wards off cyber attacks from China-based hackers |
| 2024-02-05
⋅
PCrisk
⋅
How to remove CrackedCantil from the operating system CrackedCantil |
| 2024-02-04
⋅
Infostealers
⋅
CrackedCantil: A Malware Symphony Breakdown CrackedCantil |
| 2024-02-02
⋅
The Cyber Express
⋅
Decoding KillNet 2.0 and Sylhet Gang-SG Cyberattack Plans for 2024 SYLHET GANG-SG |
| 2024-02-02
⋅
Stairwell
⋅
Proactive response: AnyDesk, any breach Agent Tesla |
| 2024-02-02
⋅
Cyber Kendra
⋅
FritzFrog Botnet Expands Attack Arsenal with Log4Shell Exploits FritzFrog |
| 2024-02-02
⋅
Gridinsoft
⋅
CrackedCantil Dropper Delivers Numerous Malware CrackedCantil |
| 2024-02-02
⋅
Medium Fofabot
⋅
Practical FOFA Asset Expansion: APT-C-23 Android Malware |
| 2024-02-01
⋅
Cado Security
⋅
From the Depths: Analyzing the Cthulhu Stealer Malware for macOS Cthulhu Stealer |
| 2024-02-01
⋅
Hunt.io
⋅
The Accidental Malware Repository: Hunting & Collecting Malware Via Open Directories (Part 1) XWorm |