Click here to download all references as Bib-File.•
2023-09-19
⋅
Medium (@DCSO_CyTec)
⋅
#ShortAndMalicious — DarkGate DarkGate |
2023-09-07
⋅
Medium (@simone.kraus)
⋅
Critical Energy Infrastructure Facility Attack In Ukraine |
2023-08-30
⋅
Medium walmartglobaltech
⋅
Gazavat / Expiro DMSniff connection and DGA analysis DMSniff Expiro Gazavat |
2023-08-02
⋅
Medium (@morimolymoly)
⋅
HUI Loader — Malware Analysis Note HUI Loader |
2023-07-31
⋅
Medium (csg-govtech)
⋅
China-Backed Hackers Threaten Texas Military Sites, Utilities |
2023-07-29
⋅
Medium walmartglobaltech
⋅
Unknown powershell backdoor with ties to new Zloader Zloader |
2023-07-23
⋅
Medium infoSec Write-ups
⋅
Unpacking an Emotet Trojan Emotet |
2023-07-18
⋅
Medium walmartglobaltech
⋅
NemesisProject Nemesis |
2023-07-07
⋅
Medium cryptax
⋅
Eyes on Android/S.O.V.A botnet sample S.O.V.A. |
2023-06-23
⋅
Medium
⋅
ObserverStealer: Unmasking the New Contender in Cyber Crime ObserverStealer |
2023-06-23
⋅
Medium (Cryptax)
⋅
Inside KangaPack: the Kangaroo packer with native decryption FluHorse |
2023-06-13
⋅
Medium BI.ZONE
⋅
Core Werewolf targets the defense industry and critical infrastructure Awaken Likho |
2023-05-17
⋅
Medium (@DCSO_CyTec)
⋅
Andariel’s “Jupiter” malware and the case of the curious C2 Jupiter |
2023-05-14
⋅
Medium
⋅
Silent Echoes: The Hidden Dialogue among Malware Entities — Spotlight on AMOS InfoStealer AMOS Aurora Stealer TitanStealer |
2023-05-09
⋅
Medium walmartglobaltech
⋅
MetaStealer string decryption and DGA overview MetaStealer |
2023-04-19
⋅
Medium (@simone.kraus)
⋅
Rorschach Ransomware Analysis with Attack Flow Rorschach Ransomware |
2023-04-17
⋅
Medium (@lcam)
⋅
Data Insights from Russian Cyber Militants: NoName05716 Dosia |
2023-04-13
⋅
Medium Invictus Incident Response
⋅
Ransomware in the cloud |
2023-04-05
⋅
Medium Ilandu
⋅
PortDoor - APT Backdoor analysis ACBackdoor 8.t Dropper PortDoor |
2023-03-23
⋅
Medium s2wlab
⋅
Scarcruft Bolsters Arsenal for targeting individual Android devices RambleOn RokRAT |