Click here to download all references as Bib-File.•
2024-02-22
⋅
Dragos
⋅
VOLTZITE Espionage Operations Targeting U.S. Critical Systems |
2024-02-22
⋅
Sekoia
⋅
Scattered Spider laying new eggs BlackCat |
2024-02-22
⋅
Uptycs
⋅
8220 Gang Cryptomining Campaign Targets Linux & Windows Platforms Water Sigbin |
2024-02-22
⋅
SPUR
⋅
CloudRouter: 911 Proxy Resurrected |
2024-02-22
⋅
Medium b.magnezi
⋅
Malware Analysis - XWorm XWorm |
2024-02-22
⋅
SentinelOne
⋅
Doppelgänger | Russia-Aligned Influence Operation Targets Germany |
2024-02-21
⋅
Invoke RE
⋅
Automating Qakbot Malware Analysis with Binary Ninja QakBot |
2024-02-21
⋅
YouTube (SentinelOne)
⋅
LABSCon23 Replay | Chasing Shadows | The rise of a prolific espionage actor 9002 RAT PlugX ShadowPad Spyder Earth Lusca |
2024-02-21
⋅
CrowdStrike
⋅
CrowdStrike Global Threat Report 2024 |
2024-02-21
⋅
POLITICO
⋅
Brussels spyware bombshell: Surveillance software found on officials’ phones |
2024-02-21
⋅
Medium b.magnezi
⋅
Malware Analysis — Remcos RAT Remcos |
2024-02-21
⋅
Cleafy
⋅
A stealthy threat uncovered: TeaBot on Google Play Store Anatsa |
2024-02-21
⋅
DCSO
⋅
To Russia With Love: Assessing a KONNI-Backdoored Suspected Russian Consular Software Installer Konni |
2024-02-21
⋅
YouTube (Invoke RE)
⋅
Analyzing Qakbot Using Binary Ninja Automation Part 3 QakBot |
2024-02-20
⋅
ANY.RUN
⋅
Understanding Macros in Malware: Types, Capabilities, Case Study |
2024-02-20
⋅
Trendmicro
⋅
Earth Preta Campaign Uses DOPLUGS to Target Asia DOPLUGS |
2024-02-20
⋅
YouTube (Embee Research)
⋅
StealC Loader Analysis - Decoding Powershell Malware With CyberChef Stealc |
2024-02-20
⋅
Washington Post
⋅
‘World’s most harmful’ cybercriminal group disrupted in 11-nation operation LockBit LockBit LockBit |
2024-02-20
⋅
Europol
⋅
Law enforcement disrupt world’s biggest ransomware operation LockBit LockBit LockBit |
2024-02-20
⋅
National Crime Agency
⋅
International investigation disrupts the world’s most harmful cyber crime group LockBit LockBit LockBit |