Click here to download all references as Bib-File.•
2024-04-24
⋅
SentinelOne
⋅
Ransomware Evolution | How Cheated Affiliates Are Recycling Victim Data for Profit BlackCat RansomHub RansomHub |
2024-04-24
⋅
Securonix
⋅
Analysis of Ongoing FROZEN#SHADOW Attack Campaign Leveraging SSLoad Malware and RMM Software for Domain Takeover Cobalt Strike Latrodectus |
2024-04-24
⋅
Seqrite
⋅
Pakistani APTs Escalate Attacks on Indian Gov. Seqrite Labs Unveils Threats and Connections AllaKore Crimson RAT |
2024-04-24
⋅
Elastic
⋅
Dissecting REMCOS RAT: An in- depth analysis of a widespread 2024 malware, Part One Remcos |
2024-04-24
⋅
kienmanowar Blog
⋅
[QuickNote] Qakbot 5.0 – Decrypt strings and configuration QakBot |
2024-04-24
⋅
Cisco
⋅
ArcaneDoor - New espionage-focused campaign found targeting perimeter network devices ArcaneDoor Storm-1849 |
2024-04-24
⋅
NCSC UK
⋅
Line Dancer - In-memory shellcode loader targeting Cisco Adaptive Security Appliance (ASA) devices. |
2024-04-24
⋅
NCSC UK
⋅
Line Runner: Persistent webshell targeting Cisco Adaptive Security Appliance (ASA) devices. |
2024-04-23
⋅
Infoblox
⋅
Muddling Meerkat: The Great Firewall Manipulator |
2024-04-22
⋅
Mandiant
⋅
M-Trends 2024 Special Report UNC4393 |
2024-04-22
⋅
Microsoft
⋅
Analyzing Forest Blizzard’s custom post-compromise tool for exploiting CVE-2022-38028 to obtain credentials GooseEgg |
2024-04-22
⋅
Wired
⋅
North Koreans Secretly Animated Amazon and Max Shows, Researchers Say |
2024-04-22
⋅
HarfangLab
⋅
MuddyWater campaign abusing Atera Agents |
2024-04-20
⋅
Axel's IT Security Research
⋅
New Robust Technique for Reliably Identifying AsyncRAT/DcRAT/VenomRAT Servers AsyncRAT DCRat Venom RAT |
2024-04-19
⋅
TEAMT5
⋅
Chinese APT: A Master of Exploiting Edge Devices SEASPY UNC4841 |
2024-04-19
⋅
⋅
Cert-UA
⋅
UAC-0133 (Sandworm) plans for cyber sabotage on almost 20 objects of critical infrastructure of Ukraine Kapeka reGeorg |
2024-04-19
⋅
Gold Pickaxe iOS Technical Analysis: IPA Overview and C2 Communication Start up |
2024-04-19
⋅
dissect.ing
⋅
Exploiting a cryptographic vulnerability inside the Donex Ransomware Donex |
2024-04-19
⋅
DARKReading
⋅
Evil XDR: Researcher Turns Palo Alto Software Into Perfect Malware |
2024-04-19
⋅
YouTube (Decipher)
⋅
A Decade of Sandworm: Digging into APT44’s Past and Future With Mandiant |