Click here to download all references as Bib-File.•
2023-06-12
⋅
⋅
NTT Security
⋅
About PowerHarbor, a new malware used by SteelClover PowerHarbor |
2023-06-08
⋅
⋅
AhnLab
⋅
Lazarus Group exploiting vulnerabilities in domestic financial security solutions LazarDoor LazarLoader |
2023-06-06
⋅
Security Intelligence
⋅
ITG10 Likely Targeting South Korean Entities of Interest to the Democratic People’s Republic of Korea (DPRK) RokRAT |
2023-06-01
⋅
K7 Security
⋅
Encrypted Chaos: Analysis of Crytox Ransomware Crytox |
2023-05-30
⋅
IBM Security
⋅
BlackCat (ALPHV) ransomware levels up for stealth, speed and exfiltration BlackCat BlackCat |
2023-05-16
⋅
KrebsOnSecurity
⋅
Russian Hacker “Wazawaka” Indicted for Ransomware Babuk Hive LockBit LockBit Babuk Hive LockBit |
2023-05-10
⋅
K7 Security
⋅
spynote SpyNote |
2023-05-10
⋅
Dragos
⋅
Deconstructing a Cybersecurity Event |
2023-05-09
⋅
YouTube (Security BSides London)
⋅
Detection At Scale |
2023-05-04
⋅
SecurityScorecard
⋅
How to Analyze Java Malware – A Case Study of STRRAT STRRAT |
2023-05-02
⋅
Trend Micro
⋅
Attack on Security Titans: Earth Longzhi Returns With New Tricks Croxloader SPHijacker Earth Longzhi |
2023-04-27
⋅
ReversingLabs
⋅
The Week in Security: A possible Colonial Pipeline 2.0, ransomware takes bite out of American eateries Zarya |
2023-04-25
⋅
Elastic
⋅
Elastic Security Labs discovers the LOBSHOT malware LOBSHOT |
2023-04-21
⋅
K7 Security
⋅
MuddyWaters back with DarkBit DarkBit |
2023-04-20
⋅
3CX
⋅
Security Update Thursday 20 April 2023 – Initial Intrusion Vector Found POOLRAT |
2023-04-18
⋅
KrebsOnSecurity
⋅
Giving a Face to the Malware Proxy Service ‘Faceless’ |
2023-04-18
⋅
NCSC UK
⋅
Jaguar Tooth - Cisco IOS malware that collects device information and enables backdoor access |
2023-04-14
⋅
Security Intelligence
⋅
Ex-Conti and FIN7 Actors Collaborate with New Domino Backdoor Minodo |
2023-04-12
⋅
Gridinsoft
⋅
XMRig is one of the most widespread malicious miners, that exploits hardware to mine Monero xmrig |
2023-04-11
⋅
China Cybersecurity Industry Alliance
⋅
Review of Cyberattacks from US Intelligence Agencies - Based on Global Cybersecurity Communities' Analyses DuQu Flame Gauss Stuxnet |