Click here to download all references as Bib-File.•
2023-07-16
⋅
Perception Point
⋅
Manipulated Caiman: The Sophisticated Snare of Mexico’s Banking Predators Mispadu |
2023-07-16
⋅
Github (cocomelonc)
⋅
Malware development: persistence - part 22. Windows Setup. Simple C++ example. |
2023-07-16
⋅
OALabs
⋅
Lobshot: Lobshot a basic hVNC bot LOBSHOT |
2023-07-15
⋅
N1ght-W0lf Blog
⋅
Deep Analysis of GCleaner GCleaner |
2023-07-15
⋅
MSSP Lab
⋅
Malware source code investigation: BlackLotus - part 1 BlackLotus |
2023-07-14
⋅
Trend Micro
⋅
Possible Supply-Chain Attack Targeting Pakistani Government Delivers Shadowpad ShadowPad DriftingCloud Tonto Team |
2023-07-14
⋅
Microsoft
⋅
Analysis of Storm-0558 techniques for unauthorized email access Storm-0558 |
2023-07-14
⋅
Proofpoint
⋅
Tweets on Discovery of WikiLoader WikiLoader |
2023-07-13
⋅
Aqua Nautilus
⋅
TeamTNT Reemerged with New Aggressive Cloud Campaign TeamTNT |
2023-07-13
⋅
Brandefense
⋅
APT 36 Campaign – Poseidon Malware Technical Analysis Poseidon Crimson RAT Oblique RAT |
2023-07-13
⋅
Rapid7 Labs
⋅
Old Blackmoon Trojan, NEW Monetization Approach KrBanker |
2023-07-13
⋅
malware.love
⋅
TrueBot Analysis Part IV - Config Extraction Silence |
2023-07-13
⋅
MSSP Lab
⋅
Malware analysis report: BlackCat ransomware BlackCat BlackCat |
2023-07-13
⋅
Trend Micro
⋅
Detecting BPFDoor Backdoor Variants Abusing BPF Filters BPFDoor Symbiote |
2023-07-12
⋅
Sekoia
⋅
CustomerLoader: a new malware distributing a wide variety of payloads CustomerLoader |
2023-07-12
⋅
Lumen
⋅
Routers From The Underground: Exposing AVrecon AVrecon |
2023-07-12
⋅
Fortinet
⋅
LokiBot Campaign Targets Microsoft Office Document Using Vulnerabilities and Macros Loki Password Stealer (PWS) |
2023-07-12
⋅
Palo Alto Networks Unit 42
⋅
Diplomats Beware: Cloaked Ursa Phishing With a Twist GraphDrop |
2023-07-12
⋅
⋅
JPCERT/CC
⋅
DangerousPassword attacks targeting developers' Windows, macOS, and Linux environments |
2023-07-12
⋅
Palo Alto Networks Unit 42
⋅
Diplomats Beware: Cloaked Ursa Phishing With a Twist |