Click here to download all references as Bib-File.•
2024-03-13
⋅
Trend Micro
⋅
CVE-2024-21412: DarkGate Operators Exploit Microsoft Windows SmartScreen Bypass in Zero-Day Campaign DarkGate |
2024-03-12
⋅
cyble
⋅
Xehook Stealer: Evolution of Cinoshi’s Project Targeting Over 100 Cryptocurrencies and 2FA Extensions (paywall) XehookStealer |
2024-03-12
⋅
⋅
Alyac
⋅
North Kimsuky organization's policy advisor camouflaged spear phishing beware |
2024-03-12
⋅
Fortinet
⋅
VCURMS: A Simple and Functional Weapon STRRAT |
2024-03-12
⋅
ShadowStackRE
⋅
Donex ransomware Donex |
2024-03-11
⋅
CyberInt
⋅
GuLoader Downloaded: A Look at the Latest Iteration CloudEyE |
2024-03-11
⋅
Dr.Web
⋅
Study of a targeted attack on a Russian enterprise in the mechanical-engineering sector WhiteSnake Stealer |
2024-03-11
⋅
YouTube (Embee Research)
⋅
Xworm Script Analysis and Deobfuscation XWorm |
2024-03-10
⋅
Krakz
⋅
SysWhispers2 analysis Pikabot |
2024-03-09
⋅
Revealing the Abyss Ransomware Abyss Locker |
2024-03-09
⋅
Asobancaria
⋅
New Backdoor Activity Socks5Systemz Socks5 Systemz |
2024-03-09
⋅
Kimsuky 2 Unidentified PS 004 (RAT) |
2024-03-08
⋅
Nofix.re
⋅
KrustyLoader - Leveraging rust compilation artifacts to obtain reliable compilation timestamps and pivoting KrustyLoader |
2024-03-07
⋅
ESET Research
⋅
Evasive Panda leverages Monlam Festival to target Tibetans MgBot Nightdoor |
2024-03-07
⋅
Twitter (@H4ckManac)
⋅
Duvel reportedly compromised by Stormous ransomware group Stormous |
2024-03-07
⋅
Malware Traffic Analysis
⋅
2024-03-07 (THURSDAY): LATRODECTUS INFECTION LEADS TO LUMMA STEALER Latrodectus Lumma Stealer |
2024-03-06
⋅
Proofpoint
⋅
TA4903: Actor Spoofs U.S. Government, Small Businesses in Phishing, BEC Bids TA4903 |
2024-03-06
⋅
BushidoToken
⋅
Tracking Adversaries: UAC-0050, Cracking The DaVinci Code |
2024-03-05
⋅
Kroll
⋅
TODDLERSHARK: ScreenConnect Vulnerability Exploited to Deploy BABYSHARK Variant BabyShark |
2024-03-05
⋅
Team Cymru
⋅
Coper / Octo - A Conductor for Mobile Mayhem… With Eight Limbs? Coper |