Common Information
Type Value
Value
API Calls
Category Data-Component
Type Mitre-Data-Component
Misp Type Cluster
Description API calls utilized by an application that could indicate malicious activity
Details Published Attributes CTI Title
Details Website 2024-12-30 27 Interlab 인터랩 | Cyber Threat Report: RambleOn Android Malware
Details Website 2024-11-16 0 Introduction to Dharma - Part 1 — Haboob
Details Website 2024-11-15 87 Babble Babble Babble Babble Babble Babble BabbleLoader
Details Website 2024-11-15 87 Babble Babble Babble Babble Babble Babble BabbleLoader
Details Website 2024-11-14 11 SQL Injection: How I Secured Personal Information (PII) of 1.1M Job Seekers
Details Website 2024-11-14 25 Asnyc RAT Analysis
Details Website 2024-11-14 31 Inside Intelligence Center: Financially Motivated Chinese Threat Actor SilkSpecter Targeting Black Friday Shoppers
Details Website 2024-11-13 1 5 Common Obfuscation Methods in Malware
Details Website 2024-11-12 2 Context is King: Using API Sessions for Security Context
Details Website 2024-11-12 1 Making Sense of Kubernetes Initial Access Vectors Part 1 – Control Plane | Wiz Blog
Details Website 2024-11-12 16 LummaStealer Lab CyberDefenders |Writeup
Details Website 2024-11-12 7 10 Best DNS Management Tools - 2025
Details Website 2024-11-11 69 BSides CPH 2024 Writeup: DIY Trojan horse or: How to get your malware past EDR
Details Website 2024-11-11 11 EDR: Don’t mess with my config
Details Website 2024-11-11 4 A new fileless variant of Remcos RAT observed in the wild
Details Website 2024-11-11 39 Kaspersky discovers new Ymir ransomware used together with RustyStealer | #hacking | #cybersecurity | #infosec | #comptia | #pentest | #ransomware | National Cyber Security Consulting
Details Website 2024-11-11 0 From Zero to API Hero: Unlock Data, Automate Tasks, and Secure Your Skills
Details Website 2024-11-11 47 Ymir: new stealthy ransomware in the wild
Details Website 2024-11-11 47 Kaspersky discovers new Ymir ransomware used together with RustyStealer
Details Website 2024-11-11 2 The Hidden Costs of API Breaches: Quantifying the Long-Term Business Impact
Details Website 2024-11-11 0 Android Network Emulator Bypassing for high security apps - Cashapp, Revolut, Banking, Healthcare, Government etc.
Details Website 2024-11-10 2 SSRF with filter bypass via open redirection vulnerability
Details Website 2024-11-10 6 Recent Keylogger Attributed to North Korean Group Andariel Analyzed Through A Hybrid Analysis Perspective | CTF导航
Details Website 2024-11-09 2 Introduction to GraphQL API Security
Details Website 2024-11-08 12 Utilizing Generative AI for Reverse Engineering