Click here to download all references as Bib-File.•
| 2025-02-15
⋅
c-b.io
⋅
Dissecting a fresh BlankGrabber sample BlankGrabber |
| 2025-02-15
⋅
⋅
Youtube (greenplan)
⋅
[BINARY REFINERY] (Emmenhtal) - Deobfuscation of a custom obfuscation algorithm Emmenhtal |
| 2025-02-15
⋅
Medium TRAC Labs
⋅
Don’t Ghost the SocGholish: GhostWeaver Backdoor FAKEUPDATES GhostWeaver |
| 2025-02-14
⋅
YouTube (Uriel Kosayev)
⋅
Reverse Engineering ARM based Mirai Botnet Mirai |
| 2025-02-14
⋅
Twitter (@DTCERT)
⋅
Twitter Thread on a password-protected loader observed in a vishing campaign Unidentified 120 |
| 2025-02-13
⋅
Zscaler
⋅
Technical Analysis of Xloader Versions 6 and 7 | Part 2 Xloader |
| 2025-02-13
⋅
Moonlock
⋅
Cybercrooks Are Using Fake Job Listings to Steal Crypto GolangGhost |
| 2025-02-13
⋅
Elastic
⋅
From South America to Southeast Asia: The Fragile Web of REF7707 FINALDRAFT FINALDRAFT GUIDLOADER PATHLOADER REF7707 |
| 2025-02-13
⋅
Securonix
⋅
Analyzing DEEP#DRIVE: North Korean Threat Actors Observed Exploiting Trusted Platforms for Targeted Attacks RandomQuery |
| 2025-02-13
⋅
Intel 471
⋅
Threat hunting case study: SocGholish FAKEUPDATES |
| 2025-02-13
⋅
Symantec
⋅
China-linked Espionage Tools Used in Ransomware Attacks PlugX |
| 2025-02-13
⋅
Elastic
⋅
You've Got Malware: FINALDRAFT Hides in Your Drafts FINALDRAFT FINALDRAFT PATHLOADER |
| 2025-02-13
⋅
Recorded Future
⋅
Inside the Scam: North Korea’s IT Worker Threat BeaverTail OtterCookie InvisibleFerret |
| 2025-02-13
⋅
Microsoft
⋅
Storm-2372 conducts device code phishing campaign Storm-2372 |
| 2025-02-13
⋅
Volexity
⋅
Multiple Russian Threat Actors Targeting Microsoft Device Code Authentication |
| 2025-02-13
⋅
Recorded Future
⋅
RedMike (Salt Typhoon) Exploits Vulnerable Cisco Devices of Global Telecommunications Providers GhostEmperor |
| 2025-02-12
⋅
Medium (@mvaks)
⋅
Two tales and one Antidot(e) — a new mobile malware campaign in Poland Antidot |
| 2025-02-12
⋅
cyble
⋅
BTMOB RAT: Newly Discovered Android Malware Spreading via Phishing Sites BTMOB RAT |
| 2025-02-12
⋅
Group-IB
⋅
RansomHub Never Sleeps Episode 1: The evolution of modern ransomware RansomHub |
| 2025-02-12
⋅
Hunt.io
⋅
Tracking Pyramid C2: Identifying Post-Exploitation Servers in Hunt Pyramid |