Click here to download all references as Bib-File.•
2024-02-05
⋅
Tweet Highlighting the Integration of GhostSocks Service into Lumma Stealer GhostSocks |
2024-02-05
⋅
YouTube (John Hammond)
⋅
PikaBot Malware Analysis: Debugging in Visual Studio Pikabot |
2024-02-05
⋅
Reuters
⋅
Philippines wards off cyber attacks from China-based hackers |
2024-02-05
⋅
PCrisk
⋅
How to remove CrackedCantil from the operating system CrackedCantil |
2024-02-04
⋅
Viuleeenz
⋅
Understanding PEB and LDR Structures using IDA and LummaStealer Lumma Stealer |
2024-02-04
⋅
Infostealers
⋅
CrackedCantil: A Malware Symphony Breakdown CrackedCantil |
2024-02-03
⋅
Cloudsek
⋅
From Discussion Forums to Malware Mayhem: The Alarming Rise of Abuse on Google Groups and Usenet CrackedCantil |
2024-02-02
⋅
The Cyber Express
⋅
Decoding KillNet 2.0 and Sylhet Gang-SG Cyberattack Plans for 2024 SYLHET GANG-SG |
2024-02-02
⋅
Github (shell-dot)
⋅
Tuoni Tuoni |
2024-02-02
⋅
Stairwell
⋅
Proactive response: AnyDesk, any breach Agent Tesla |
2024-02-02
⋅
Cyber Kendra
⋅
FritzFrog Botnet Expands Attack Arsenal with Log4Shell Exploits FritzFrog |
2024-02-02
⋅
Gridinsoft
⋅
CrackedCantil Dropper Delivers Numerous Malware CrackedCantil |
2024-02-02
⋅
Medium Fofabot
⋅
Practical FOFA Asset Expansion: APT-C-23 Android Malware |
2024-02-02
⋅
Github (VenzoV)
⋅
WikiLoader "notepad" part 1 - Decrypting Shellcode WikiLoader |
2024-02-01
⋅
Cado Security
⋅
From the Depths: Analyzing the Cthulhu Stealer Malware for macOS Cthulhu Stealer |
2024-02-01
⋅
Hunt.io
⋅
The Accidental Malware Repository: Hunting & Collecting Malware Via Open Directories (Part 1) XWorm |
2024-02-01
⋅
⋅
Infinitum IT
⋅
DcRat Technical Analysis Report (Paywall) DCRat |
2024-02-01
⋅
ESET Research
⋅
ESET takes part in global operation to disrupt the Grandoreiro banking trojan Grandoreiro |
2024-02-01
⋅
Medium g0njxa
⋅
Installskey Rewind 2023 CrackedCantil |
2024-02-01
⋅
YouTube (Embee Research)
⋅
Xworm Malware Analysis - Unravelling Multi-stage Malware with CyberChef and DnSpy XWorm |