Click here to download all references as Bib-File.•
2024-09-18
⋅
loginsoft
⋅
Medusa Ransomware: Evolving Tactics in Modern Cyber Extortion MedusaLocker |
2024-09-11
⋅
loginsoft
⋅
Akira Ransomware: The Evolution of a Major Threat Akira Akira |
2024-07-29
⋅
loginsoft
⋅
Blue Screen Mayhem: When CrowdStrike's Glitch Became Threat Actor's Playground Daolpu HijackLoader Remcos |
2023-05-23
⋅
loginsoft
⋅
Taming the Storm: Understanding and Mitigating the Consequences of CVE-2023-27350 Clop LockBit Silence |
2023-05-02
⋅
loginsoft
⋅
IcedID Malware: Traversing Through its Various Incarnations IcedID |
2023-04-12
⋅
loginsoft
⋅
Maximizing Threat Detections of Qakbot with Osquery QakBot |
2023-03-30
⋅
loginsoft
⋅
From Innocence to Malice: The OneNote Malware Campaign Uncovered Agent Tesla AsyncRAT DOUBLEBACK Emotet Formbook IcedID NetWire RC QakBot Quasar RAT RedLine Stealer XWorm |
2023-03-24
⋅
loginsoft
⋅
Aurora: The Dark Dawn and its Menacing Effects Aurora Stealer |