Common Information
Type | Value |
---|---|
Value |
kernelbase.dll |
Category | |
Type | File |
Misp Type | |
Description |
Details | Published | Attributes | CTI | Title | ||
---|---|---|---|---|---|---|
Details | Website | 2024-11-30 | 5 | Reverse Engineering Firefox and Tor Targeted Payloads — Leviathan Security Group | ||
Details | Website | 2024-11-11 | 11 | EDR: Don’t mess with my config | ||
Details | Website | 2024-11-11 | 39 | Kaspersky discovers new Ymir ransomware used together with RustyStealer | #hacking | #cybersecurity | #infosec | #comptia | #pentest | #ransomware | National Cyber Security Consulting | ||
Details | Website | 2024-11-11 | 46 | «Лаборатория Касперского» обнаружила новый шифровальщик Ymir | ||
Details | Website | 2024-11-11 | 47 | Ymir: new stealthy ransomware in the wild | ||
Details | Website | 2024-11-11 | 47 | Kaspersky discovers new Ymir ransomware used together with RustyStealer | ||
Details | Website | 2024-11-07 | 66 | European diplomats targeted by APT29 (Cozy Bear) with WINELOADER | ||
Details | Website | 2024-11-03 | 6 | Spoofing Call Stacks to Evade EDR Detection | ||
Details | Website | 2024-10-30 | 10 | เพื่อตัวเอง 01: Windows User Mode vs Kernel Mode | ||
Details | Website | 2024-10-26 | 14 | .Net Hooking with Frida and Fermion | ||
Details | Website | 2024-10-25 | 25 | The Windows Registry Adventure #4: Hives and the registry layout | ||
Details | Website | 2024-10-17 | 10 | Call stack spoofing explained using APT41 malware | ||
Details | Website | 2024-10-17 | 10 | Call stack spoofing explained using APT41 malware – CYBER GEEKS | ||
Details | Website | 2024-09-24 | 12 | Analyzing the Newest Turla Backdoor Through the Eyes of Hybrid Analysis | ||
Details | Website | 2024-09-18 | 33 | How to Collect Threat Intelligence Using Search Parameters in TI Lookup | ||
Details | Website | 2024-09-18 | 25 | How to Get Threat Intelligence Using TI Lookup Search Parameters | ||
Details | Website | 2024-09-13 | 143 | THM Metasploit Meterpreter | ||
Details | Website | 2024-09-11 | 4 | Analysis of VMProtect | ||
Details | Website | 2024-09-09 | 25 | Exploring an Experimental Windows Kernel Rootkit in Rust | ||
Details | Website | 2024-07-25 | 33 | Thread Name-Calling - using Thread Name for offense - Check Point Research | ||
Details | Website | 2024-07-18 | 26 | HotPage: Story of a signed, vulnerable, ad-injecting driver | ||
Details | Website | 2024-07-18 | 91 | APT41 Has Arisen From the DUST | Google Cloud Blog | ||
Details | Website | 2024-07-15 | 88 | DodgeBox: A deep dive into the updated arsenal of APT41 | Part 1 | ||
Details | Website | 2024-06-27 | 13 | The Windows Registry Adventure #3: Learning resources | ||
Details | Website | 2024-04-24 | 180 | [QuickNote] Qakbot 5.0 – Decrypt strings and configuration |