Click here to download all references as Bib-File.•
2021-04-21
⋅
splunk
⋅
Monitoring Pulse Connect Secure With Splunk (CISA Emergency Directive 21-03) |
2021-04-19
⋅
nviso
⋅
How to analyze mobile malware: a Cabassous/FluBot Case study FluBot |
2021-04-15
⋅
Avast Decoded
⋅
HackBoss: A cryptocurrency-stealing malware distributed through Telegram |
2021-04-12
⋅
DataBreaches.net
⋅
A chat with DarkSide DarkSide |
2021-04-12
⋅
⋅
Knownsec
⋅
APT SideWinder's latest attack on a certain region in South Asia |
2021-04-06
⋅
Malwarebytes
⋅
Aurora campaign: Attacking Azerbaijan using multiple RATs |
2021-04-05
⋅
Kaspersky
⋅
The leap of a Cycldek-related threat actor |
2021-03-26
⋅
MIT Technology Review
⋅
Google’s top security teams unilaterally shut down a counterterrorism operation |
2021-03-21
⋅
Twitter (@CyberRaiju)
⋅
Twitter Thread with analysis of .NET China Chopper CHINACHOPPER |
2021-03-15
⋅
Trustwave
⋅
HAFNIUM, China Chopper and ASP.NET Runtime CHINACHOPPER |
2021-03-15
⋅
Council on Foreign Relations
⋅
The Iran-Russia Cyber Agreement and U.S. Strategy in the Middle East |
2021-03-08
⋅
Palo Alto Networks Unit 42
⋅
Analyzing Attacks Against Microsoft Exchange Server With China Chopper Webshells CHINACHOPPER |
2021-02-23
⋅
Medium (Katie’s Five Cents)
⋅
A Cyber Threat Intelligence Self-Study Plan: Part 1 |
2021-02-18
⋅
Bitdefender
⋅
Iranian APT Makes a Comeback with “Thunder and Lightning” Backdoor and Espionage Combo Infy Tonnerre |
2021-02-17
⋅
Palo Alto Networks Unit 42
⋅
WatchDog: Exposing a Cryptojacking Campaign That’s Operated for Two Years |
2021-02-16
⋅
SophosLabs Uncut
⋅
A Conti ransomware attack day-by-day Conti |
2021-02-10
⋅
360 netlab
⋅
Rinfo Is Making A Comeback and Is Scanning and Mining in Full Speed |
2021-02-09
⋅
Trend Micro
⋅
Threat actors now target Docker via container escape features |
2021-02-08
⋅
Wired
⋅
A Hacker Tried to Poison a Florida City's Water Supply, Officials Say |
2021-02-02
⋅
ESET Research
⋅
Kobalos – A complex Linux threat to high performance computing infrastructure Kobalos |