Click here to download all references as Bib-File.•
2024-02-02
⋅
Stairwell
⋅
Proactive response: AnyDesk, any breach Agent Tesla |
2024-02-02
⋅
Cyber Kendra
⋅
FritzFrog Botnet Expands Attack Arsenal with Log4Shell Exploits FritzFrog |
2024-02-01
⋅
⋅
Infinitum IT
⋅
DcRat Technical Analysis Report (Paywall) DCRat |
2024-02-01
⋅
ESET Research
⋅
ESET takes part in global operation to disrupt the Grandoreiro banking trojan Grandoreiro |
2024-02-01
⋅
Securonix
⋅
Analysis and Detection of STEADY#URSA Attack Campaign Targeting Ukraine Military Dropping New Covert SUBTLE-PAWS PowerShell Backdoor SUBTLE-PAWS |
2024-01-31
⋅
Stairwell
⋅
Technical analysis: The silent torrent of VileRAT VileRAT EVILNUM |
2024-01-30
⋅
ASEC
⋅
Trigona Ransomware Threat Actor Uses Mimic Ransomware Trigona |
2024-01-30
⋅
ANY.RUN
⋅
CrackedCantil: A Malware Symphony Breakdown - PrivateLoader, Smoke, Lumma, RedLine, RisePro, Amadey, Stealc, Socks5Systemz, STOP Amadey CrackedCantil Lumma Stealer PrivateLoader RedLine Stealer RisePro SmokeLoader Socks5 Systemz Stealc STOP |
2024-01-30
⋅
Bleeping Computer
⋅
Police disrupt Grandoreiro banking malware operation, make arrests Grandoreiro |
2024-01-30
⋅
AT&T Cybersecurity
⋅
DarkGate malware delivered via Microsoft Teams - detection and response DarkGate |
2024-01-30
⋅
DCSO
⋅
Reporting on Volt Typhoon’s “JDY” Botnet Administration Via Tor Sparks Questions |
2024-01-29
⋅
hacked.codes
⋅
Technical analysis of WinRAR zero-day malware and C2 protocol emulation |
2024-01-29
⋅
Aquasec
⋅
HeadCrab 2.0: Evolving Threat in Redis Malware Landscape HeadCrab |
2024-01-29
⋅
HarfangLab
⋅
Compromised Routers Are Still Leveraged as Malicious Infrastructure to Target Government Organizations in Europe and the Caucasus MASEPIE OCEANMAP |
2024-01-26
⋅
SOCRadar
⋅
Russian APT Operation: Star Blizzard |
2024-01-25
⋅
JSAC 2024
⋅
NSPX30: A sophisticated AitM-enabled implant evolving since 2005 NSPX30 ProjectWood |
2024-01-25
⋅
ESET Research
⋅
NSPX30: A sophisticated AitM-enabled implant evolving since 2005 NSPX30 ProjectWood Blackwood |
2024-01-25
⋅
JSAC 2024
⋅
The Secret Life of RATs: connecting the dots by dissecting multiple backdoors DracuLoader GroundPeony HemiGate PlugX |
2024-01-25
⋅
JSAC 2024
⋅
Threat Intelligence of Abused Public Post-Exploitation Frameworks AsyncRAT DCRat Empire Downloader GRUNT Havoc Koadic Merlin PoshC2 Quasar RAT Sliver |
2024-01-25
⋅
JSAC 2024
⋅
Lazarus Group’s Large-scale Threats via Watering Hole and Financial Software |