Click here to download all references as Bib-File.•
| 2024-10-06
⋅
Google
⋅
Caught in the wild - Past, present and future |
| 2024-10-05
⋅
Malware Analysis - Lumma Stealer Lumma Stealer |
| 2024-10-04
⋅
VirusBulletin
⋅
TA577 walked just past you: indirect syscalls in Pikabot Pikabot |
| 2024-10-04
⋅
Memory Forensic
⋅
Inside Cridex - Memory Analysis Case Study Feodo |
| 2024-10-04
⋅
VirusBulletin
⋅
Octopus Prime: it didn't turn into a truck, but a widely spread Android botnet Coper |
| 2024-10-04
⋅
nikhilh-20
⋅
Emansrepo Infostealer - PyInstaller, Deobfuscation and LLM emansrepo |
| 2024-10-04
⋅
Cyfirma
⋅
VILSA STEALER Vilsa Stealer |
| 2024-10-03
⋅
Lexfo
⋅
StealC Malware Analysis Part 2 Stealc |
| 2024-10-03
⋅
Lexfo
⋅
StealC Malware Analysis Part 1 Stealc |
| 2024-10-03
⋅
Lexfo
⋅
StealC Malware Analysis Part 3 Stealc |
| 2024-10-03
⋅
Virus Bulletin
⋅
Sugarcoating KANDYKORN: a sweet dive into a sophisticated MacOS backdoor HLOADER KANDYKORN SUGARLOADER |
| 2024-10-03
⋅
Microsoft
⋅
Protecting Democratic Institutions from Cyber Threats Callisto |
| 2024-10-03
⋅
CitizenLab
⋅
Disrupting COLDRIVER: U.S. court orders seizure of domains used in Russian cyberattacks Callisto |
| 2024-10-03
⋅
US Department of Justice
⋅
Justice Department Disrupts Russian Intelligence Spear-Phishing Efforts Callisto |
| 2024-10-03
⋅
US Court for the District of Columbia
⋅
Civil Action No. 1:24-cv-02719-RC: Microsoft vs. Star Blizzard Callisto |
| 2024-10-03
⋅
Securonix
⋅
SHROUDED#SLEEP: A Deep Dive into North Korea’s Ongoing Campaign Against Southeast Asia |
| 2024-10-03
⋅
GitHub (dstepanic)
⋅
Getting Cozy with Milk and WARMCOOKIES WarmCookie |
| 2024-10-03
⋅
Aqua
⋅
perfctl: A Stealthy Malware Targeting Millions of Linux Servers perfctl |
| 2024-10-02
⋅
Secureworks
⋅
2024 State of the Threat GOLD REBELLION |
| 2024-10-02
⋅
ThreatMon
⋅
Amnesia Stealer Technical Malware Analysis Report BlankGrabber |