Click here to download all references as Bib-File.•
2023-06-12
⋅
⋅
NTT Security
⋅
About PowerHarbor, a new malware used by SteelClover PowerHarbor |
2023-06-09
⋅
cocomelonc
⋅
Malware development trick - part 33. Syscalls - part 2. Simple C++ example. |
2023-06-09
⋅
ConnectWise
⋅
SmashJacker (ChromeLoader variant) Choziosi |
2023-06-08
⋅
VMRay
⋅
Busy Bees - The Transformation of BumbleBee BumbleBee Cobalt Strike Conti Meterpreter Sliver |
2023-06-08
⋅
Check Point Research
⋅
Stealth Soldier Backdoor Used in Targeted Espionage Attacks in North Africa Stealth Soldier |
2023-06-07
⋅
darksys0x
⋅
Analysis and Reversing of srvnet2.sys LIONTAIL |
2023-06-07
⋅
cocomelonc
⋅
Malware development trick - part 32. Syscalls - part 1. Simple C++ example. |
2023-06-06
⋅
Trend Micro
⋅
Xollam, the Latest Face of TargetCompany TargetCompany |
2023-06-06
⋅
Apophis133
⋅
RedLine Technical Analysis Report RedLine Stealer |
2023-06-06
⋅
Security Intelligence
⋅
ITG10 Likely Targeting South Korean Entities of Interest to the Democratic People’s Republic of Korea (DPRK) RokRAT |
2023-06-06
⋅
Sentinel LABS
⋅
Kimsuky Strikes Again: New Social Engineering Campaign Aims to Steal Credentials and Gather Strategic Intelligence |
2023-06-05
⋅
Sekoia
⋅
Iran Cyber Threat Overview Cotton Sandstorm |
2023-06-05
⋅
Malware Traffic Analysis
⋅
30 DAYS OF FORMBOOK: DAY 1, MONDAY 2023-06-05 Formbook |
2023-06-05
⋅
Kaspersky Labs
⋅
Satacom delivers browser extension that steals cryptocurrency Satacom |
2023-06-04
⋅
Github (cocomelonc)
⋅
Malware development trick - part 31: Run shellcode via SetTimer. Simple C++ example. |
2023-06-03
⋅
Zscaler
⋅
Technical Analysis of Bandit Stealer Bandit Stealer |
2023-06-02
⋅
Mandiant
⋅
Zero-Day Vulnerability in MOVEit Transfer Exploited for Data Theft |
2023-06-01
⋅
Infinitum IT
⋅
BlackCat Ransomware Analysis Report (Paywall) BlackCat |
2023-06-01
⋅
vmware
⋅
Carbon Black’s TrueBot Detection Silence |
2023-06-01
⋅
K7 Security
⋅
Encrypted Chaos: Analysis of Crytox Ransomware Crytox |