Click here to download all references as Bib-File.

Enter keywords to filter the library entries below or Propose new Entry
2024-10-16Trend MicroJaromír Hořejší, Nitesh Surana
Fake LockBit, Real Damage: Ransomware Samples Abuse AWS S3 to Steal Data
BockLit
2023-05-19Trend MicroJaromír Hořejší, Nitesh Surana
Rust-Based Info Stealers Abuse GitHub Codespaces
DeltaStealer
2022-09-12Trend MicroNitesh Surana
Security Breaks: TeamTNT’s DockerHub Credentials Leak
2022-09-08Trend MicroAlfredo Oliveira, David Fiser, Nitesh Surana
How Malicious Actors Abuse Native Linux Tools in Attacks
2022-04-20Trend MicroAshish Verma, Nitesh Surana
Analyzing Attempts to Exploit the Spring4Shell Vulnerability CVE-2022-22965 to Deploy Cryptocurrency Miners
2022-04-08Trend MicroAshish Verma, Deep Patel, Nitesh Surana
CVE-2022-22965: Analyzing the Exploitation of Spring4Shell Vulnerability in Weaponizing and Executing the Mirai Botnet Malware
Mirai
2021-12-03Trend MicroNitesh Surana
Vulnerabilities Exploited for Monero Mining Malware Delivered via GitHub, Netlify
2021-04-16Trend MicroNitesh Surana
Could the Microsoft Exchange breach be stopped?
CHINACHOPPER