Click here to download all references as Bib-File.•
2024-02-11
⋅
Estrellas's Blog
⋅
Unpacking an Emotet trojan Emotet |
2024-02-11
⋅
glyc3rius.github.io
⋅
Analysing STOP Ransomware STOP |
2024-02-10
⋅
Nofix.re
⋅
KrustyLoader - About stripped Rust symbol recovery KrustyLoader |
2024-02-09
⋅
Hunt.io
⋅
Tracking ShadowPad Infrastructure Via Non-Standard Certificates ShadowPad |
2024-02-09
⋅
Department of Justice
⋅
International Cybercrime Malware Service Dismantled by Federal Authorities: Key Malware Sales and Support Actors in Malta and Nigeria Charged in Federal Indictments Ave Maria |
2024-02-09
⋅
YouTube (Invoke RE)
⋅
Analyzing and Unpacking Qakbot Using Binary Ninja Automation Part 2 QakBot |
2024-02-09
⋅
Censys
⋅
A Beginners Guide to Tracking Malware Infrastructure AsyncRAT BianLian Cobalt Strike QakBot |
2024-02-09
⋅
K7 Security
⋅
The Phoenix Rises Again |
2024-02-09
⋅
YouTube (Embee Research)
⋅
Guloader Decoding With Cyberchef CloudEyE |
2024-02-08
⋅
Cisco Talos
⋅
New Zardoor backdoor used in long-term cyber espionage operation targeting an Islamic organization HTran reGeorg Venom Proxy ZarDoor |
2024-02-08
⋅
K7 Security
⋅
Unmasking-the-dot-stealer |
2024-02-08
⋅
Cybercrime Diaries
⋅
Russian Language Cybercriminal Forums – Analyzing The Most Active And Renowned Communities. Raccoon RecordBreaker |
2024-02-08
⋅
ANALYST1
⋅
“This Forum is a Bunch of Communists and They Set Me Up”, LockBit Spills the Tea Regarding Their Recent Ban on Russian-Speaking Forums LockBit |
2024-02-08
⋅
YouTube (Embee Research)
⋅
Cobalt Strike Decoding and C2 Extraction - 3 Minute Malware Analysis Speedrun Cobalt Strike |
2024-02-07
⋅
Microsoft
⋅
Iran surges cyber-enabled influence operations in support of Hamas |
2024-02-07
⋅
Check Point Research
⋅
Raspberry Robin Keeps Riding the Wave of Endless 1-Days Raspberry Robin |
2024-02-07
⋅
Lumen
⋅
KV-Botnet: Don’t call it a Comeback KV |
2024-02-07
⋅
Medium s2wlab
⋅
Kimsuky disguised as a Korean company signed with a valid certificate to distribute Troll Stealer AlphaSeed Appleseed Troll Stealer |
2024-02-07
⋅
Malwarebytes
⋅
How to tell if your toothbrush is being used in a DDoS attack |
2024-02-07
⋅
CrowdStrike
⋅
HijackLoader Expands Techniques to Improve Defense Evasion HijackLoader |