Click here to download all references as Bib-File.•
2024-02-07
⋅
CISA
⋅
PRC State-Sponsored Actors Compromise and Maintain Persistent Access to U.S. Critical Infrastructure ScanLine |
2024-02-06
⋅
Knownsec
⋅
APT-K-47 Organization Launches Espionage Attacks Using a New Trojan Tool Nimbo-C2 ORPCBackdoor |
2024-02-06
⋅
Knownsec
⋅
APT-K-47 Organization Launches Espionage Attacks Using a New Trojan Tool Nimbo-C2 ORPCBackdoor |
2024-02-06
⋅
Fortinet
⋅
Reverse engineering of Android/Phoenix Phoenix |
2024-02-06
⋅
Medium osamaellahi
⋅
Unfolding Agent Tesla: The Art of Credentials Harvesting. Agent Tesla |
2024-02-06
⋅
Group-IB
⋅
Dead-end job: ResumeLooters gang infects websites with XSS scripts and SQL injections to vacuum up job seekers' personal data and CVs ResumeLooters |
2024-02-06
⋅
The Hacker News
⋅
Beware: Fake Facebook Job Ads Spreading 'Ov3r_Stealer' to Steal Crypto and Credentials CrackedCantil Phemedrone Stealer |
2024-02-06
⋅
Trustwave
⋅
Facebook Advertising Spreads Novel Malware Variant Phemedrone Stealer |
2024-02-06
⋅
NCSC NL
⋅
Ministry of Defense of the Netherlands uncovers COATHANGER, a stealthy Chinese FortiGate RAT BOLDMOVE |
2024-02-05
⋅
Tweet Highlighting the Integration of GhostSocks Service into Lumma Stealer GhostSocks |
2024-02-05
⋅
YouTube (John Hammond)
⋅
PikaBot Malware Analysis: Debugging in Visual Studio Pikabot |
2024-02-05
⋅
Reuters
⋅
Philippines wards off cyber attacks from China-based hackers |
2024-02-05
⋅
PCrisk
⋅
How to remove CrackedCantil from the operating system CrackedCantil |
2024-02-04
⋅
Viuleeenz
⋅
Understanding PEB and LDR Structures using IDA and LummaStealer Lumma Stealer |
2024-02-04
⋅
Infostealers
⋅
CrackedCantil: A Malware Symphony Breakdown CrackedCantil |
2024-02-03
⋅
Cloudsek
⋅
From Discussion Forums to Malware Mayhem: The Alarming Rise of Abuse on Google Groups and Usenet CrackedCantil |
2024-02-02
⋅
The Cyber Express
⋅
Decoding KillNet 2.0 and Sylhet Gang-SG Cyberattack Plans for 2024 SYLHET GANG-SG |
2024-02-02
⋅
Github (shell-dot)
⋅
Tuoni Tuoni |
2024-02-02
⋅
Stairwell
⋅
Proactive response: AnyDesk, any breach Agent Tesla |
2024-02-02
⋅
Cyber Kendra
⋅
FritzFrog Botnet Expands Attack Arsenal with Log4Shell Exploits FritzFrog |