Click here to download all references as Bib-File.•
2024-01-29
⋅
hacked.codes
⋅
Technical analysis of WinRAR zero-day malware and C2 protocol emulation |
2024-01-29
⋅
Aquasec
⋅
HeadCrab 2.0: Evolving Threat in Redis Malware Landscape HeadCrab |
2024-01-29
⋅
SonicWall
⋅
Blackwood APT Group Has a New DLL Loader NSPX30 Blackwood |
2024-01-29
⋅
Synacktiv
⋅
KrustyLoader - Rust malware linked to Ivanti ConnectSecure compromises KrustyLoader |
2024-01-26
⋅
Trendmicro
⋅
Spot the Difference: An Analysis of the New LODEINFO Campaign by Earth Kasha Anel Cobalt Strike LODEINFO NOOPDOOR |
2024-01-26
⋅
Ars Technica
⋅
The life and times of Cozy Bear, the Russian hackers who just hit Microsoft and HPE |
2024-01-25
⋅
IBM
⋅
Broomstick Analysis Report (IRIS-17079) Broomstick |
2024-01-25
⋅
JSAC 2024
⋅
The Secret Life of RATs: connecting the dots by dissecting multiple backdoors DracuLoader GroundPeony HemiGate PlugX |
2024-01-25
⋅
JSAC 2024
⋅
Threat Intelligence of Abused Public Post-Exploitation Frameworks AsyncRAT DCRat Empire Downloader GRUNT Havoc Koadic Merlin PoshC2 Quasar RAT Sliver |
2024-01-25
⋅
JSAC 2024
⋅
Lazarus Group’s Large-scale Threats via Watering Hole and Financial Software |
2024-01-25
⋅
JSAC 2024
⋅
A Study on Long-Term Trends about Amadey C2 Infrastructure Amadey |
2024-01-25
⋅
JSAC 2024
⋅
Operation So-seki: You Are a Threat Actor. As Yet You Have No Name |
2024-01-25
⋅
Microsoft
⋅
Midnight Blizzard: Guidance for responders on nation-state attack UNC2452 |
2024-01-24
⋅
Medium shaddy43
⋅
Layers of Deception: Analyzing the Complex Stages of XLoader 4.3 Malware Evolution Xloader Formbook |
2024-01-23
⋅
Quick Heal
⋅
Pop-up Ad Alert! Beware of Unrealistic Claims on your Smartphones |
2024-01-23
⋅
CSIRT-CTI
⋅
Stately Taurus Targets Myanmar Amidst Concerns over Military Junta’s Handling of Rebel Attacks PlugX PUBLOAD TONESHELL |
2024-01-23
⋅
Trend Micro
⋅
Kasseika Ransomware Deploys BYOVD Attacks, Abuses PsExec and Exploits Martini Driver Kasseika |
2024-01-23
⋅
YouTube (Invoke RE)
⋅
Analyzing and Unpacking Qakbot using Binary Ninja Automation QakBot |
2024-01-22
⋅
Resecurity
⋅
Cybercriminals leaked massive volumes of stolen PII data from Thailand in Dark Web GhostR |
2024-01-22
⋅
Pulsedive
⋅
Pikabot distirbution methods and capabilities Pikabot |