Click here to download all references as Bib-File.•
| 2025-09-30
⋅
Google
⋅
Cybercrime Observations from the Frontlines: UNC6040 Proactive Hardening Recommendations |
| 2025-04-22
⋅
Volexity
⋅
Phishing for Codes: Russian Threat Actors Target Microsoft 365 OAuth Workflows UTA0352 UTA0355 |
| 2024-10-23
⋅
Trend Micro
⋅
Unmasking Prometei: A Deep Dive Into Our MXDR Findings Prometei |
| 2024-10-15
⋅
Microsoft
⋅
Phish, Click, Breach: Hunting for a Sophisticated Cyber Attack UNC4393 |
| 2024-06-20
⋅
Red Canary
⋅
Gourav Khandelwal, Akash Chaudhuri, Matthew Mesa, Sagar Patil, Uri Oren, Krithika Ramakrishnan UNC4393 |
| 2024-01-10
⋅
Volexity
⋅
Active Exploitation of Two Zero-Day Vulnerabilities in Ivanti Connect Secure VPN UTA0178 |
| 2023-07-10
⋅
Mandiant
⋅
Defend Against the Latest Active Directory Certificate Services Threats |
| 2023-06-15
⋅
Google
⋅
Barracuda ESG Zero-Day Vulnerability (CVE-2023-2868) Exploited Globally by Aggressive and Skilled Actor, Suspected Links to China SALTWATER SEASPY WHIRLPOOL UNC4841 |
| 2023-06-15
⋅
Mandiant
⋅
Barracuda ESG Zero-Day Vulnerability (CVE-2023-2868) Exploited Globally by Aggressive and Skilled Actor, Suspected Links to China SALTWATER SEASPY UNC4841 |
| 2023-06-02
⋅
Mandiant
⋅
Zero-Day Vulnerability in MOVEit Transfer Exploited for Data Theft |
| 2023-05-09
⋅
Huntress Labs
⋅
Advanced Cyberchef Tips - AsyncRAT Loader AsyncRAT |
| 2023-05-07
⋅
Twitter (@embee_research)
⋅
AgentTesla - Full Loader Analysis - Resolving API Hashes Using Conditional Breakpoints Agent Tesla |
| 2023-04-18
⋅
Cisco Talos
⋅
State-sponsored campaigns target global network infrastructure |
| 2023-04-10
⋅
Twitter (@embee_research)
⋅
Redline Stealer - Static Analysis and C2 Extraction Amadey RedLine Stealer |
| 2022-11-14
⋅
Twitter (@embee_research)
⋅
Twitter thread on Yara Signatures for Qakbot Encryption Routines IcedID QakBot |
| 2022-11-03
⋅
paloalto Netoworks: Unit42
⋅
Cobalt Strike Analysis and Tutorial: Identifying Beacon Team Servers in the Wild Cobalt Strike |
| 2022-07-06
⋅
Trend Micro
⋅
Brand-New HavanaCrypt Ransomware Poses as Google Software Update App, Uses Microsoft Hosting Service IP Address as C&C Server HavanaCrypt |
| 2022-05-05
⋅
NCC Group
⋅
North Korea’s Lazarus: their initial access trade-craft using social media and social engineering LCPDot |
| 2022-04-28
⋅
nccgroup
⋅
LAPSUS$: Recent techniques, tactics and procedures |
| 2022-04-12
⋅
Sophos
⋅
Attackers linger on government agency computers before deploying Lockbit ransomware LockBit |