Click here to download all references as Bib-File.•
2024-03-12
⋅
Fortinet
⋅
VCURMS: A Simple and Functional Weapon STRRAT |
2024-03-12
⋅
ShadowStackRE
⋅
Donex ransomware Donex |
2024-03-11
⋅
CyberInt
⋅
GuLoader Downloaded: A Look at the Latest Iteration CloudEyE |
2024-03-11
⋅
Dr.Web
⋅
Study of a targeted attack on a Russian enterprise in the mechanical-engineering sector WhiteSnake Stealer |
2024-03-11
⋅
YouTube (Embee Research)
⋅
Xworm Script Analysis and Deobfuscation XWorm |
2024-03-10
⋅
Krakz
⋅
SysWhispers2 analysis Pikabot |
2024-03-09
⋅
Kimsuky 2 Unidentified PS 004 (RAT) |
2024-03-07
⋅
Twitter (@H4ckManac)
⋅
Duvel reportedly compromised by Stormous ransomware group Stormous |
2024-03-07
⋅
ESET Research
⋅
Evasive Panda leverages Monlam Festival to target Tibetans MgBot |
2024-03-07
⋅
Malware Traffic Analysis
⋅
2024-03-07 (THURSDAY): LATRODECTUS INFECTION LEADS TO LUMMA STEALER Lumma Stealer Unidentified 111 (Latrodectus) |
2024-03-06
⋅
BushidoToken
⋅
Tracking Adversaries: UAC-0050, Cracking The DaVinci Code |
2024-03-05
⋅
Team Cymru
⋅
Coper / Octo - A Conductor for Mobile Mayhem… With Eight Limbs? Coper |
2024-03-05
⋅
CIP
⋅
Semi-Annual Chronicles of UAC-0006 Operations SmokeLoader |
2024-03-05
⋅
Reliaquest
⋅
Anxun and Chinese APT Activity ShadowPad |
2024-03-05
⋅
Medium walmartglobaltech
⋅
Unknown Nim Loader using PSBypassCLM Unidentified 115 (Nim Loader) |
2024-03-04
⋅
Logpoint
⋅
Inside DarkGate: Exploring the infection chain and capabilities DarkGate |
2024-03-04
⋅
Proofpoint
⋅
TA577’s Unusual Attack Chain Leads to NTLM Data Theft |
2024-03-04
⋅
⋅
Weixin
⋅
Shadow Hunting: Analysis of APT37’s attack activities against South Korea using North Korean political topics RokRAT |
2024-03-04
⋅
Cleafy
⋅
On-Device Fraud on the rise: exposing a recent Copybara fraud campaign Joker |
2024-03-03
⋅
OALabs
⋅
GitHub Bug Used to Infect Game Hackers With Lua Malware SmartLoader |