Click here to download all references as Bib-File.•
2023-12-20
⋅
Intezer
⋅
Operation HamsaUpdate: A Sophisticated Campaign Delivering Wipers Puts Israeli Infrastructure at Risk FlashDevelop Handala Hatef Handala |
2023-05-24
⋅
Intezer
⋅
CryptoClippy is Evolving to Pilfer Even More Financial Data CryptoClippy |
2022-11-10
⋅
Intezer
⋅
How LNK Files Are Abused by Threat Actors BumbleBee Emotet Mount Locker QakBot |
2022-07-06
⋅
Intezer
⋅
OrBit: New Undetected Linux Threat Uses Unique Hijack of Execution Flow HiddenWasp OrBit Symbiote |
2022-04-04
⋅
Intezer
⋅
Elephant Framework Delivered in Phishing Attacks Against Ukrainian Organizations GraphSteel GrimPlant SaintBear |
2022-01-11
⋅
Intezer
⋅
New SysJoker Backdoor Targets Windows, Linux, and macOS SysJoker SysJoker SysJoker |
2021-07-07
⋅
Intezer
⋅
Global Phishing Campaign Targets Energy Sector and its Suppliers |
2021-04-06
⋅
Intezer
⋅
Rocke Group Actively Targeting the Cloud: Wants Your SSH Keys |
2021-01-13
⋅
Intezer
⋅
A Rare Look Inside a Cryptojacking Campaign and its Profit |
2020-10-01
⋅
Intezer
⋅
A Storm is Brewing: IPStorm Now Has Linux Malware IPStorm |
2020-09-08
⋅
Intezer
⋅
Attackers Abusing Legitimate Cloud Monitoring Tools to Conduct Cyber Attacks |
2020-07-28
⋅
Intezer
⋅
Watch Your Containers: Doki Infecting Docker Servers in the Cloud Doki |