Click here to download all references as Bib-File.•
2022-12-16
⋅
Sekoia
⋅
The DPRK delicate sound of cyber AppleJeus AppleJeus SnatchCrypto |
2022-12-12
⋅
Reuters
⋅
North Korean cyber spies deploy new tactic: tricking foreign experts into writing research for them |
2022-12-09
⋅
Secureworks
⋅
Drokbk Malware Uses GitHub as Dead Drop Resolver Drokbk |
2022-12-08
⋅
Team Cymru
⋅
Iranian Exploitation Activities Continue as of November 2022 |
2022-12-06
⋅
Blackberry
⋅
Mustang Panda Uses the Russian-Ukrainian War to Attack Europe and Asia Pacific Targets PlugX |
2022-12-05
⋅
Sekoia
⋅
Calisto show interests into entities involved in Ukraine war support |
2022-12-01
⋅
splunk
⋅
From Macros to No Macros: Continuous Malware Improvements by QakBot QakBot |
2022-11-22
⋅
Proofpoint
⋅
Nighthawk: An Up-and-Coming Pentest Tool Likely to Gain Threat Actor Notice Nighthawk |
2022-11-21
⋅
Sekoia
⋅
Aurora: a rising stealer flying under the radar Aurora Stealer |
2022-11-21
⋅
Blackberry
⋅
Gamaredon Leverages Microsoft Office Docs to Target Ukraine Government and Military Pteranodon |
2022-11-16
⋅
splunk
⋅
Inside the Mind of a ‘Rat’ - Agent Tesla Detection and Analysis Agent Tesla |
2022-11-10
⋅
Zscaler
⋅
Rise of Banking Trojan Dropper in Google Play Xenomorph |
2022-11-07
⋅
ThreatMon
⋅
Arkei Staler Analysis Arkei Stealer |
2022-11-03
⋅
Team Cymru
⋅
Inside the V1 Raccoon Stealer’s Den Raccoon |
2022-11-02
⋅
Sekoia
⋅
BlueFox Stealer: a newcomer designed for traffers teams Aurora Stealer BlueFox |
2022-10-23
⋅
Blackberry
⋅
Unattributed RomCom Threat Actor Spoofing Popular Apps Now Hits Ukrainian Militaries ROMCOM RAT RomCom |
2022-10-20
⋅
cyble
⋅
New Temp Stealer Spreading Via Free & Cracked Software TempStealer |
2022-10-13
⋅
Blackberry
⋅
BianLian Ransomware Encrypts Files in the Blink of an Eye BianLian |
2022-10-07
⋅
Team Cymru
⋅
A Visualizza into Recent IcedID Campaigns: Reconstructing Threat Actor Metrics with Pure Signal™ Recon IcedID PhotoLoader |
2022-10-06
⋅
ThreatMon
⋅
Rhadamanthys Stealer Analysis Rhadamanthys |