Click here to download all references as Bib-File.•
2024-03-27
⋅
Twitter (@embee_research)
⋅
Uncovering Malicious Infrastructure with DNS Pivoting LokiBot XWorm |
2024-03-26
⋅
Medium zyadlzyatsoc
⋅
Comprehensive Analysis of EMOTET Malware: Part 1 Emotet |
2024-03-26
⋅
K7 Security
⋅
Unknown TTPs of Remcos RAT Remcos |
2024-03-26
⋅
Palo Alto Networks Unit 42
⋅
ASEAN Entities in the Spotlight: Chinese APT Group Targeting PUBLOAD |
2024-03-26
⋅
Lumen
⋅
The Darkside Of TheMoon TheMoon |
2024-03-26
⋅
EchoCTI
⋅
Agent Tesla Technical Analysis Report Agent Tesla |
2024-03-25
⋅
ANY.RUN
⋅
Reverse Engineering Snake Keylogger: Full .NET Malware Analysis Walkthrough 404 Keylogger GaboonGrabber |
2024-03-25
⋅
Github (veo)
⋅
vshell Vshell |
2024-03-25
⋅
embeeresearch
⋅
Latrodectus Deobfuscation - Removal of Junk Comments and Self-Referencing Code Latrodectus |
2024-03-25
⋅
iVerify
⋅
Clipping Wings: Our Analysis of a Pegasus Spyware Sample Chrysaor |
2024-03-24
⋅
Securonix
⋅
Analysis of DEV#POPPER: New Attack Campaign Targeting Software Developers Likely Associated With North Korean Threat Actors BeaverTail |
2024-03-24
⋅
Viuleeenz
⋅
Understanding API Hashing and build a rainbow table for LummaStealer Lumma Stealer |
2024-03-22
⋅
Mandiant
⋅
APT29 Uses WINELOADER to Target German Political Parties WINELOADER |
2024-03-22
⋅
Palo Alto
⋅
Large-Scale StrelaStealer Campaign in Early 2024 StrelaStealer |
2024-03-21
⋅
cyber5w
⋅
CryptNet Ransomware Detailed Analysis CryptNET |
2024-03-21
⋅
Proofpoint
⋅
Security Brief: TA450 Uses Embedded Links in PDF Attachments in Latest Campaign |
2024-03-20
⋅
Microsoft
⋅
Tax season cybersecurity: What cybercriminals want and who they target most. Is it you? |
2024-03-20
⋅
CISA
⋅
Review of the Summer 2023 Microsoft Exchange Online Intrusion Storm-0558 |
2024-03-20
⋅
K7 Security
⋅
Python Ciphering : Delving into Evil Ant’s Ransomware’s Tactics Evil Ant |
2024-03-19
⋅
Medium b.magnezi
⋅
Malware Analysis NjRat NjRAT |