Click here to download all references as Bib-File.•
2024-08-29
⋅
Proofpoint
⋅
The Malware That Must Not Be Named: Suspected Espionage Campaign Delivers “Voldemort” Voldemort |
2024-07-16
⋅
JPCERT/CC
⋅
MirrorFace Attack against Japanese Organisations LODEINFO NOOPDOOR |
2024-07-15
⋅
Sekoia
⋅
MuddyWater replaces Atera by custom MuddyRot implant in a recent campaign bugsleep |
2024-06-28
⋅
Trend Micro
⋅
Examining Water Sigbin's Infection Routine Leading to an XMRig Cryptominer Water Sigbin |
2024-06-25
⋅
Cado Security
⋅
From Dormant to Dangerous: P2Pinfect Evolves to Deploy New Ransomware and Cryptominer P2Pinfect |
2024-06-03
⋅
SpyCloud
⋅
Reversing Atomic macOS Stealer: Binaries, Backdoors & Browser Theft AMOS |
2024-05-30
⋅
Akamai
⋅
RedTail Cryptominer Threat Actors Adopt PAN-OS CVE-2024-3400 Exploit RedTail |
2024-05-07
⋅
⋅
Gatewatcher
⋅
Cybercrime's Anatomy Threats to the Healthcare World |
2024-05-04
⋅
Medium MITRE-Engenuity
⋅
Technical Deep Dive: Understanding the Anatomy of a Cyber Intrusion WIREFIRE |
2024-04-22
⋅
Microsoft
⋅
Analyzing Forest Blizzard’s custom post-compromise tool for exploiting CVE-2022-38028 to obtain credentials GooseEgg |
2024-04-10
⋅
Proofpoint
⋅
Security Brief: TA547 Targets German Organizations with Rhadamanthys Stealer Rhadamanthys |
2024-04-08
⋅
Zscaler
⋅
Automating Pikabot’s String Deobfuscation Pikabot |
2024-03-18
⋅
Perception Point
⋅
Operation PhantomBlu: New and Evasive Method Delivers NetSupport RAT NetSupportManager RAT |
2024-03-18
⋅
PCrisk
⋅
FORCE (.FORCE) ransomware virus – removal and decryption options Phobos |
2024-03-04
⋅
Proofpoint
⋅
TA577’s Unusual Attack Chain Leads to NTLM Data Theft |
2024-02-29
⋅
CrowdStrike
⋅
The Anatomy of an ALPHA SPIDER Ransomware Attack BlackCat Alpha Spider |
2024-02-27
⋅
Bitdefender
⋅
When Stealers Converge: New Variant of Atomic Stealer in the Wild AMOS |
2024-02-22
⋅
Uptycs
⋅
8220 Gang Cryptomining Campaign Targets Linux & Windows Platforms Water Sigbin |
2024-02-21
⋅
Invoke RE
⋅
Automating Qakbot Malware Analysis with Binary Ninja QakBot |
2024-02-21
⋅
YouTube (Invoke RE)
⋅
Analyzing Qakbot Using Binary Ninja Automation Part 3 QakBot |