Click here to download all references as Bib-File.•
| 2021-04-19
⋅
Cybleinc
⋅
ZLoader Returns Through Spelevo Exploit Kit & Phishing Campaign Zloader |
| 2021-04-19
⋅
nviso
⋅
How to analyze mobile malware: a Cabassous/FluBot Case study FluBot |
| 2021-04-19
⋅
Youtube (AhmedS Kasmani)
⋅
Malware Analysis of a Password Stealer Poulight Stealer |
| 2021-04-19
⋅
Washington Examiner
⋅
Inside the CIA and NSA disagreement over Russian bounties story |
| 2021-04-19
⋅
Anomali
⋅
PRIMITIVE BEAR (Gamaredon) Targets Ukraine with Timely Themes |
| 2021-04-19
⋅
NEW YORKER
⋅
The Incredible Rise of North Korea’s Hacking Army |
| 2021-04-19
⋅
Sentinel LABS
⋅
A Deep Dive into Zebrocy’s Dropper Docs Downdelph |
| 2021-04-19
⋅
InfoSec Handlers Diary Blog
⋅
Hunting phishing websites with favicon hashes |
| 2021-04-19
⋅
Twitter (@_alex_il_)
⋅
Tweet on QakBot's additional decryption mechanism QakBot |
| 2021-04-19
⋅
Intel 471
⋅
How China’s cybercrime underground is making money off big data |
| 2021-04-19
⋅
Netresec
⋅
Analysing a malware PCAP with IcedID and Cobalt Strike traffic Cobalt Strike IcedID |
| 2021-04-19
⋅
Medium elis531989
⋅
Dancing With Shellcodes: Cracking the latest version of Guloader CloudEyE |
| 2021-04-19
⋅
CERT NZ
⋅
Microsoft 365 phishing using fake voicemail messages |
| 2021-04-18
⋅
Bleeping Computer
⋅
Discord Nitro gift codes now demanded as ransomware payments Nitro |
| 2021-04-18
⋅
BBC
⋅
1. Hacking Hollywood |
| 2021-04-18
⋅
Anchored Narratives on Threat Intelligence and Geopolitics
⋅
Recover your files with StrongPity StrongPity |
| 2021-04-18
⋅
xorl %eax, %eax
⋅
US Cyber Operations Groups |
| 2021-04-18
⋅
YouTube (dist67)
⋅
Decoding Cobalt Strike Traffic Cobalt Strike |
| 2021-04-18
⋅
Twitter (@ViriBack)
⋅
Tweet on Seth Loader |
| 2021-04-17
⋅
YouTube (Worcester DEFCON Group)
⋅
Inside IcedID: Anatomy Of An Infostealer IcedID |