Click here to download all references as Bib-File.•
| 2022-04-27
⋅
Zscaler
⋅
Targeted attack on Thailand Pass customers delivers AsyncRAT AsyncRAT |
| 2022-04-21
⋅
CrowdStrike
⋅
LemonDuck Targets Docker for Cryptomining Operations Lemon Duck |
| 2022-04-14
⋅
Bleeping Computer
⋅
New ZingoStealer infostealer drops more malware, cryptominers |
| 2022-04-13
⋅
ESET Research
⋅
ESET takes part in global operation to disrupt Zloader botnets Cobalt Strike Zloader |
| 2022-04-07
⋅
Github (Jhangju)
⋅
office-node (OFFODE) - This is POC of how an attacker automate user's responce and bypass outlook OFFODE |
| 2022-04-07
⋅
Microsoft
⋅
Disrupting cyberattacks targeting Ukraine (APT28) |
| 2022-04-06
⋅
Abnormal
⋅
Tax Return Customer Campaign Attempts to Infect Victims with Sorillus RAT Sorillus RAT |
| 2022-03-24
⋅
Sentinel LABS
⋅
Chinese Threat Actor Scarab Targeting Ukraine Scieron Scarab |
| 2022-03-24
⋅
Sentinel LABS
⋅
Chinese Threat Actor Scarab Targeting Ukraine HeaderTip Scieron |
| 2022-03-21
⋅
The DFIR Report
⋅
APT35 Automates Initial Access Using ProxyShell |
| 2022-03-21
⋅
Azure DevOps (Mastadamus)
⋅
Anatomy of An Mirai Botnet Attack Mirai |
| 2022-03-17
⋅
CISA
⋅
Alert (AA22-076A) Strengthening Cybersecurity of SATCOM Network Providers and Customers |
| 2022-03-15
⋅
JPCERT/CC
⋅
Anti-UPX Unpacking Technique Mirai |
| 2022-03-12
⋅
Arash's Blog
⋅
Analyzing Malware with Hooks, Stomps, and Return-addresses Cobalt Strike |
| 2022-03-07
⋅
Check Point Research
⋅
Lapsus$ Ransomware gang uses stolen source code to disguise malware files as trustworthy. Check Point customers remain protected LAPSUS |
| 2022-03-02
⋅
Bleeping Computer
⋅
Log4shell exploits now used mostly for DDoS botnets, cryptominers Kinsing Tsunami BillGates |
| 2022-03-01
⋅
Cybereason
⋅
Cybereason vs. BlackCat Ransomware BlackCat |
| 2022-02-26
⋅
Atomic Matryoshka
⋅
Infographic: APTs in South America Imminent Monitor RAT Machete |
| 2022-02-24
⋅
Mandiant
⋅
Left On Read: Telegram Malware Spotted in Latest Iranian Cyber Espionage Activity STARWHALE GRAMDOOR |
| 2022-02-22
⋅
CrowdStrike
⋅
CrowdStrike Research Investigates Exploit Behavior to Strengthen Customer Protection |