Common Information
Type | Value |
---|---|
Value |
API Calls |
Category | Data-Component |
Type | Mitre-Data-Component |
Misp Type | Cluster |
Description | API calls utilized by an application that could indicate malicious activity |
Details | Published | Attributes | CTI | Title | ||
---|---|---|---|---|---|---|
Details | Website | 2024-12-30 | 27 | Interlab 인터랩 | Cyber Threat Report: RambleOn Android Malware | ||
Details | Website | 2024-11-16 | 0 | Introduction to Dharma - Part 1 — Haboob | ||
Details | Website | 2024-11-15 | 87 | Babble Babble Babble Babble Babble Babble BabbleLoader | ||
Details | Website | 2024-11-15 | 87 | Babble Babble Babble Babble Babble Babble BabbleLoader | ||
Details | Website | 2024-11-14 | 11 | SQL Injection: How I Secured Personal Information (PII) of 1.1M Job Seekers | ||
Details | Website | 2024-11-14 | 25 | Asnyc RAT Analysis | ||
Details | Website | 2024-11-14 | 31 | Inside Intelligence Center: Financially Motivated Chinese Threat Actor SilkSpecter Targeting Black Friday Shoppers | ||
Details | Website | 2024-11-13 | 1 | 5 Common Obfuscation Methods in Malware | ||
Details | Website | 2024-11-12 | 2 | Context is King: Using API Sessions for Security Context | ||
Details | Website | 2024-11-12 | 1 | Making Sense of Kubernetes Initial Access Vectors Part 1 – Control Plane | Wiz Blog | ||
Details | Website | 2024-11-12 | 16 | LummaStealer Lab CyberDefenders |Writeup | ||
Details | Website | 2024-11-12 | 7 | 10 Best DNS Management Tools - 2025 | ||
Details | Website | 2024-11-11 | 69 | BSides CPH 2024 Writeup: DIY Trojan horse or: How to get your malware past EDR | ||
Details | Website | 2024-11-11 | 11 | EDR: Don’t mess with my config | ||
Details | Website | 2024-11-11 | 4 | A new fileless variant of Remcos RAT observed in the wild | ||
Details | Website | 2024-11-11 | 39 | Kaspersky discovers new Ymir ransomware used together with RustyStealer | #hacking | #cybersecurity | #infosec | #comptia | #pentest | #ransomware | National Cyber Security Consulting | ||
Details | Website | 2024-11-11 | 0 | From Zero to API Hero: Unlock Data, Automate Tasks, and Secure Your Skills | ||
Details | Website | 2024-11-11 | 47 | Ymir: new stealthy ransomware in the wild | ||
Details | Website | 2024-11-11 | 47 | Kaspersky discovers new Ymir ransomware used together with RustyStealer | ||
Details | Website | 2024-11-11 | 2 | The Hidden Costs of API Breaches: Quantifying the Long-Term Business Impact | ||
Details | Website | 2024-11-11 | 0 | Android Network Emulator Bypassing for high security apps - Cashapp, Revolut, Banking, Healthcare, Government etc. | ||
Details | Website | 2024-11-10 | 2 | SSRF with filter bypass via open redirection vulnerability | ||
Details | Website | 2024-11-10 | 6 | Recent Keylogger Attributed to North Korean Group Andariel Analyzed Through A Hybrid Analysis Perspective | CTF导航 | ||
Details | Website | 2024-11-09 | 2 | Introduction to GraphQL API Security | ||
Details | Website | 2024-11-08 | 12 | Utilizing Generative AI for Reverse Engineering |