Click here to download all references as Bib-File.•
2024-05-09
⋅
Meterpreter
⋅
Cybersecurity Firm Hacked: Sensitive Data on Sale IntelBroker |
2024-05-09
⋅
0x0d4y
⋅
[Case Study: Latrodectus] Analyzing and Implementing String Decryption Algorithms Latrodectus |
2024-05-08
⋅
Mandiant
⋅
M-Trends 2024 Special Report: Chinese Espionage Operations Targeting The Visibility Gap BOLDMOVE WHIRLPOOL |
2024-05-08
⋅
Medium (montysecurity)
⋅
From OSINT to Disk: Wave Stealer Analysis Wave Stealer |
2024-05-08
⋅
Elastic
⋅
Elastic Security - WarmCookie YARA Rule WarmCookie |
2024-05-08
⋅
CERT.PL
⋅
APT28 campaign targeting Polish government institutions Headlace |
2024-05-07
⋅
Elastic
⋅
Elastic Security - GhostEngine YARA Rule win.ghostengine |
2024-05-07
⋅
Twitter (@fs0c131y)
⋅
Tweets on LockBitSupp LockBit |
2024-05-07
⋅
KrebsOnSecurity
⋅
U.S. Charges Russian Man as Boss of LockBit Ransomware Group LockBit |
2024-05-07
⋅
AhnLab
⋅
LNK File Disguised as Certificate Distributing RokRAT Malware RokRAT |
2024-05-07
⋅
⋅
Gatewatcher
⋅
Cybercrime's Anatomy Threats to the Healthcare World |
2024-05-06
⋅
Security Affairs
⋅
El Salvador suffered a massive leak of biometric data CiberInteligenciaSV |
2024-05-06
⋅
Zscaler
⋅
HijackLoader Updates HijackLoader |
2024-05-06
⋅
Cyber-Forensics
⋅
Agent Tesla Malware Analysis Agent Tesla |
2024-05-05
⋅
Github (VenzoV)
⋅
Latrodectus "littlehw" Latrodectus |
2024-05-04
⋅
Risk Associates
⋅
191 Australian Organizations affected by ZircoDATA Breach Linked to Russian Ransomware Gang |
2024-05-04
⋅
Medium MITRE-Engenuity
⋅
Technical Deep Dive: Understanding the Anatomy of a Cyber Intrusion WIREFIRE |
2024-05-03
⋅
Aqua Nautilus
⋅
Kinsing Demystified: A Comprehensive Technical Guide Kinsing |
2024-05-03
⋅
Elastic
⋅
Dissecting REMCOS RAT: An in- depth analysis of a widespread 2024 malware, Part Three Remcos |
2024-05-02
⋅
calif.io
⋅
Dissecting LOCKBIT v3 ransomware LockBit |