Click here to download all references as Bib-File.•
| 2025-03-26
⋅
⋅
ISH Tecnologia
⋅
ffdgf Lynx |
| 2025-03-26
⋅
⋅
Youtube (greenplan)
⋅
[BINARY REFINERY] (StegoCampaign) - Deobfuscation of a VBScript stage (PART 1) |
| 2025-03-26
⋅
Cisco Talos
⋅
Year in Review |
| 2025-03-26
⋅
ThreatMon
⋅
Raton / Silly - Remote Access Trojan | Technical Malware Analysis Report AsyncRAT |
| 2025-03-26
⋅
Zscaler
⋅
CoffeeLoader: A Brew of Stealthy Techniques CoffeeLoader |
| 2025-03-26
⋅
Twitter (@MalGamy12)
⋅
Tweet about RALord ransomware RALord |
| 2025-03-25
⋅
GoDaddy
⋅
Inside DollyWay’s C2 Infrastructure: Traffic Direction Systems and the LosPollos Connection DollyWay |
| 2025-03-25
⋅
Inside Kimsuky’s Latest Cyberattack: Analyzing Malicious Scripts and Payloads |
| 2025-03-25
⋅
⋅
Youtube (greenplan)
⋅
[BINARY REFINERY] (StegoCampaign) - Scrittura di una Unit per ottenere il C2 |
| 2025-03-25
⋅
IBM X-Force
⋅
IBM X-Force discovers new Sheriff Backdoor used to target Ukraine Deputy Sheriff |
| 2025-03-25
⋅
JPCERT/CC
⋅
Tempted to Classifying APT Actors: Practical Challenges of Attribution in the Case of Lazarus’s Subgroup |
| 2025-03-25
⋅
DomainTools
⋅
Phishing Campaign Targets Defense and Aerospace Firms Linked to Ukraine Conflict |
| 2025-03-25
⋅
Kaspersky Labs
⋅
Operation ForumTroll: APT attack with Google Chrome zero-day exploit chain Operation ForumTroll |
| 2025-03-25
⋅
SpyCloud
⋅
On the Hunt for Ghost(Socks) GhostSocks |
| 2025-03-24
⋅
Broadcom
⋅
SVCStealer malware SVCStealer |
| 2025-03-24
⋅
Rewterz Information Security
⋅
SvcStealer Malware Targeting Users to Extract Sensitive Data from Browsers and Applications – Active IOCs SVCStealer |
| 2025-03-24
⋅
SYGNIA
⋅
Weaver Ant, the Web Shell Whisperer: Tracking a Live China-nexus Operation CHINACHOPPER reGeorg |
| 2025-03-23
⋅
AviaB
⋅
Analyzing Vidar Stealer Vidar |
| 2025-03-22
⋅
Trend Micro
⋅
Back to Business: Lumma Stealer Returns with Stealthier Methods Lumma Stealer |
| 2025-03-21
⋅
Seqrite
⋅
SVC New Stealer on the Horizon SVCStealer |