Click here to download all references as Bib-File.•
2024-09-12
⋅
Cado Security
⋅
From Automation to Exploitation: The Growing Misuse of Selenium Grid for Cryptomining and Proxyjacking perfctl |
2024-02-01
⋅
Cado Security
⋅
From the Depths: Analyzing the Cthulhu Stealer Malware for macOS Cthulhu Stealer |
2021-10-06
⋅
Anomali
⋅
Inside TeamTNT’s Impressive Arsenal: A Look Into A TeamTNT Server TeamTNT |
2021-09-02
⋅
Anomali
⋅
Cybercrime Group FIN7 Using Windows 11 Alpha-Themed Docs to Drop Javascript Backdoor |
2021-05-13
⋅
Anomali
⋅
Threat Actors Use MSBuild to Deliver RATs Filelessly Remcos |
2021-04-19
⋅
Anomali
⋅
PRIMITIVE BEAR (Gamaredon) Targets Ukraine with Timely Themes |
2021-03-31
⋅
Anomali
⋅
Bahamut Possibly Responsible for Multi-Stage Infection Chain Campaign |