Click here to download all references as Bib-File.•
2024-06-12
⋅
Gdata
⋅
New backdoor BadSpace delivered by high-ranking infected websites WarmCookie |
2024-06-11
⋅
Kroll
⋅
PLAY Ransomware Group Gains Access via Citrix Bleed Vulnerability PLAY |
2024-06-11
⋅
Invoke RE
⋅
Parser Script for Havoc Config Havoc |
2024-06-11
⋅
Zscaler
⋅
A Brief History of SmokeLoader, Part 1 SmokeLoader |
2024-06-10
⋅
cyble
⋅
Vietnamese Entities Targeted by China-Linked Mustang Panda in Cyber Espionage |
2024-06-10
⋅
Mandiant
⋅
UNC5537 Targets Snowflake Customer Instances for Data Theft and Extortion Lumma Stealer MetaStealer Raccoon RedLine Stealer RisePro Vidar UNC5537 |
2024-06-10
⋅
The Hacker News
⋅
More_eggs Malware Disguised as Resumes Targets Recruiters in Phishing Attack More_eggs |
2024-06-10
⋅
Zscaler
⋅
Technical Analysis of the Latest Variant of ValleyRAT ValleyRAT |
2024-06-09
⋅
XLab
⋅
New Threat: A Deep Dive Into the Zergeca Botnet Zergeca |
2024-06-07
⋅
The Record
⋅
Russia-linked Vermin hackers target Ukrainian military in new espionage campaign UAC-0020 |
2024-06-07
⋅
SOCRadar
⋅
Grandoreiro Malware Campaign: A Global Threat to Banking Security Grandoreiro |
2024-06-07
⋅
Security Affairs
⋅
Pandabuy was extorted twice by the same Threat Actor IntelBroker |
2024-06-06
⋅
Morphisec
⋅
Howling at the Inbox: Sticky Werewolf’s Latest Malicious Aviation Attacks Angry Likho |
2024-06-06
⋅
Blackberry
⋅
Kimsuky is targeting an arms manufacturer in Europe. |
2024-06-06
⋅
Bleeping Computer
⋅
New Gitloker attacks wipe GitHub repos in extortion scheme Gitloker |
2024-06-06
⋅
Hunt.io
⋅
Tracking LightSpy: Certificates as Windows into Adversary Behavior lightSpy |
2024-06-06
⋅
CrowdStrike
⋅
EMBERSim: A Large-Scale Databank for Boosting Similarity Search in Malware Analysis |
2024-06-06
⋅
Medium b.magnezi
⋅
Agent Tesla Analysis Agent Tesla |
2024-06-06
⋅
ANY.RUN
⋅
Example Run on ANY.RUN for GaboonGrabber GaboonGrabber |
2024-06-06
⋅
Medium b.magnezi
⋅
Remcos RAT Analysis Remcos |