Click here to download all references as Bib-File.•
2024-06-07
⋅
The Record
⋅
Russia-linked Vermin hackers target Ukrainian military in new espionage campaign UAC-0020 |
2024-06-07
⋅
SOCRadar
⋅
Grandoreiro Malware Campaign: A Global Threat to Banking Security Grandoreiro |
2024-06-07
⋅
Security Affairs
⋅
Pandabuy was extorted twice by the same Threat Actor IntelBroker |
2024-06-06
⋅
Morphisec
⋅
Howling at the Inbox: Sticky Werewolf’s Latest Malicious Aviation Attacks Angry Likho |
2024-06-06
⋅
Blackberry
⋅
Kimsuky is targeting an arms manufacturer in Europe. |
2024-06-06
⋅
Bleeping Computer
⋅
New Gitloker attacks wipe GitHub repos in extortion scheme Gitloker |
2024-06-06
⋅
Hunt.io
⋅
Tracking LightSpy: Certificates as Windows into Adversary Behavior lightSpy |
2024-06-06
⋅
CrowdStrike
⋅
EMBERSim: A Large-Scale Databank for Boosting Similarity Search in Malware Analysis |
2024-06-06
⋅
Medium b.magnezi
⋅
Agent Tesla Analysis Agent Tesla |
2024-06-06
⋅
ANY.RUN
⋅
Example Run on ANY.RUN for GaboonGrabber GaboonGrabber |
2024-06-06
⋅
Medium b.magnezi
⋅
Remcos RAT Analysis Remcos |
2024-06-06
⋅
kienmanowar Blog
⋅
[QuickNote] DarkGate – Make AutoIt Great Again DarkGate |
2024-06-05
⋅
Mandiant
⋅
Phishing for Gold: Cyber Threats Facing the 2024 Paris Olympics Callisto |
2024-06-05
⋅
Symantec
⋅
RansomHub: New Ransomware has Origins in Older Knight Knight RansomHub RansomHub |
2024-06-05
⋅
QuoIntelligence
⋅
European Election Security At Risk: A Detailed Analysis of State-Sponsored, eCrime, and Hacktivist Threats Dragonbridge |
2024-06-05
⋅
Qurakslab
⋅
QBinDiff: A modular differ to enhance binary diffing and graph alignment (Slides) |
2024-06-05
⋅
⋅
QuarksLab
⋅
QBinDiff: A modular differ to enhance binary diffing and graph alignment (Video) |
2024-06-05
⋅
⋅
Cert-UA
⋅
UAC-0020 (Vermin) attacks the Defense Forces of Ukraine using the SPECTR SPZ in tandem with the legitimate SyncThing ("SickSync" campaign) (CERT-UA#9934) UAC-0020 |
2024-06-05
⋅
⋅
SSTIC
⋅
Reverse engineering of malicious code in CTI - Analysis of the evolution of an infection chain (Video) FlowCloud |
2024-06-05
⋅
⋅
Sekoia
⋅
Reverse engineering of malicious code in CTI - Analysis of the evolution of an infection chain (Paper) FlowCloud |