Click here to download all references as Bib-File.•
2024-11-13
⋅
ANY.RUN
⋅
HawkEye Malware: Technical Analysis HawkEye Keylogger |
2024-11-13
⋅
Sekoia
⋅
A three-beat waltz: The ecosystem behind Chinese state-sponsored cyber threats |
2024-11-13
⋅
TEHTRIS
⋅
Cracking Formbook malware: Blind deobfuscation and quick response techniques Formbook |
2024-11-13
⋅
Bitdefender
⋅
ShrinkLocker (+Decryptor): From Friend to Foe, and Back Again |
2024-11-13
⋅
ClearSky
⋅
CVE-2024-43451: A New Zero-Day Vulnerability Exploited in the wild SparkRAT UAC-0194 |
2024-11-12
⋅
Kroll
⋅
LUMMASTEALER Delivered Via PowerShell Social Engineering Lumma Stealer |
2024-11-12
⋅
Blackberry
⋅
LightSpy: APT41 Deploys Advanced DeepData Framework In Targeted Southern Asia Espionage Campaign DEEPDATA |
2024-11-12
⋅
Recorded Future
⋅
China-Nexus TAG-112 Compromises Tibetan Websites to Distribute Cobalt Strike Cobalt Strike TAG-112 |
2024-11-12
⋅
Qianxin
⋅
New Zero-Detection Variant of Melofee Backdoor from Winnti Strikes RHEL 7.9 Melofee |
2024-11-12
⋅
Recorded Future
⋅
China-Nexus TAG-112 Compromises Tibetan Websites to Distribute Cobalt Strike Cobalt Strike |
2024-11-12
⋅
SecurityScorecard
⋅
The Botnet is Back: SSC STRIKE Team Uncovers a Renewed Cyber Threat |
2024-11-12
⋅
Hunt.io
⋅
Targeting Innovation: Sliver C2 and Ligolo-ng Used in Operation Aimed at Y Combinator Sliver |
2024-11-12
⋅
DataBreaches.net
⋅
Amazon confirms employee data breach after vendor hack Nam3L3ss |
2024-11-10
⋅
DFIR.ch
⋅
Reptile's Custom Kernel-Module Launcher reptile |
2024-11-08
⋅
Fortinet
⋅
New Campaign Uses Remcos RAT to Exploit Victims Remcos |
2024-11-08
⋅
Trend Micro
⋅
Breaking Down Earth Estries' Persistent TTPs in Prolonged Cyber Operations |
2024-11-08
⋅
⋅
Rostelecom-Solar
⋅
The Elusive GoblinRAT – The Story Behind the Most Secretive and Mysterious Linux Backdoor Found in Government Infrastructures |
2024-11-08
⋅
RedPacket Security
⋅
[APT73] – Ransomware Victim: www[.]baldinger-ag[.]ch APT73 |
2024-11-07
⋅
Cisco Talos
⋅
Unwrapping the emerging Interlock ransomware attack Rhysida |
2024-11-07
⋅
ESET Research
⋅
APT Activity Report: Abusing Cloud Services and VPN Platforms in the Pursuit of New Prey FrostyNeighbor |