Click here to download all references as Bib-File.•
2025-02-24
⋅
Medium SlowMist
⋅
Cryptocurrency APT Intelligence: Unveiling Lazarus Group’s Intrusion Techniques |
2025-02-23
⋅
The Guardian
⋅
Hackers steal $1.5bn from crypto exchange in ‘biggest digital heist ever’ |
2025-02-23
⋅
Github (albertzsigovits)
⋅
ToxicEye RAT config extraction and YARA signatures ToxicEye |
2025-02-22
⋅
⋅
Youtube (greenplan)
⋅
[BINARY REFINERY] (MintsLoader) - Deobfuscation of a simple XOR to get the URL MintsLoader |
2025-02-22
⋅
CrowdStrike
⋅
Curly Spider UNC4393 |
2025-02-22
⋅
CrowdStrike
⋅
Wandering Spider Black Basta Black Basta GOLD REBELLION |
2025-02-22
⋅
Cointelegraph
⋅
Lazarus Group moves funds to multiple wallets as Bybit offers bounty |
2025-02-21
⋅
cyjax
⋅
How’s that for a malicious Linkc, new group launches DLS LinkC Pub |
2025-02-21
⋅
Medium SarvivaMalwareAnalyst
⋅
Process Hollowing — Malware Reverse Engineering. |
2025-02-21
⋅
SonicWall
⋅
Remcos RAT Targets Europe: New AMSI and ETW Evasion Tactics Uncovered Remcos |
2025-02-21
⋅
Kaspersky Labs
⋅
Angry Likho: Old beasts in a new forest Lumma Stealer Angry Likho |
2025-02-21
⋅
TRM Labs
⋅
TRM Links North Korea to Record $1.5 Billion Record Hack |
2025-02-21
⋅
Twitter (@salmanvsf)
⋅
Tweet about VXPCrypter |
2025-02-20
⋅
RedHotCyber
⋅
Linkc Ransomware: The New Cybercriminal Group Targeting Artificial Intelligence Data LinkC Pub |
2025-02-20
⋅
Group-IB
⋅
Fingerprint Heists: How your browser fingerprint can be stolen and used by fraudsters ScreamedJungle |
2025-02-20
⋅
Hunt.io
⋅
LightSpy Expands Command List to Include Social Media Platforms lightSpy |
2025-02-20
⋅
Trend Micro
⋅
Updated Shadowpad Malware Leads to Ransomware Deployment EvilExtractor PlugX ShadowPad Teleboyi |
2025-02-20
⋅
Cisco Talos
⋅
Weathering the storm: In the midst of a Typhoon |
2025-02-20
⋅
Cyber Triage
⋅
WMI Malware: The Complete Forensics Guide ShrinkLocker |
2025-02-20
⋅
Reliaquest
⋅
48 Minutes: How Fast Phishing Attacks Exploit Weaknesses ReedBed |