Click here to download all references as Bib-File.•
2023-06-15
⋅
Cado Security
⋅
Tracking Diicot: an emerging Romanian threat actor |
2023-06-14
⋅
PICUS Security
⋅
Picus Cyber Threat Intelligence Report May 2023: Top 10 MITRE ATT&CK Techniques Earth Longzhi |
2023-06-14
⋅
Microsoft
⋅
Cadet Blizzard emerges as a novel and distinct Russian threat actor p0wnyshell reGeorg WhisperGate DEV-0586 SaintBear |
2023-06-14
⋅
VulnCheck
⋅
Fake Security Researcher GitHub Repositories Deliver Malicious Implant TorLoader |
2023-06-14
⋅
CISA
⋅
Understanding Ransomware Threat Actors: Lockbit LockBit |
2023-06-13
⋅
Medium BI.ZONE
⋅
Core Werewolf targets the defense industry and critical infrastructure Awaken Likho |
2023-06-13
⋅
Mandiant
⋅
VMware ESXi Zero-Day Used by Chinese Espionage Actor to Perform Privileged Guest Operations on Compromised Hypervisors |
2023-06-13
⋅
Outpost24
⋅
ICS attack classifications: differentiating between cyberwarfare, cyberterrorism, and hacktivism UAC-0118 |
2023-06-13
⋅
Mandiant
⋅
VMware ESXi Zero-Day Used by Chinese Espionage Actor to Perform Privileged Guest Operations on Compromised Hypervisors (UNC3886) UNC3886 |
2023-06-13
⋅
Snatch Ransomware — Techniques and Procedures |
2023-06-12
⋅
Sophos
⋅
Deep dive into the Pikabot cyber threat Pikabot |
2023-06-12
⋅
Kaspersky Labs
⋅
Sneaky DoubleFinger loads GreetingGhoul targeting your cryptocurrency DoubleFinger GreetingGhoul |
2023-06-12
⋅
⋅
NTT Security
⋅
About PowerHarbor, a new malware used by SteelClover PowerHarbor |
2023-06-12
⋅
The DFIR Report
⋅
A Truly Graceful Wipe Out FlawedGrace Silence |
2023-06-10
⋅
The DFIR Report
⋅
IcedID Brings ScreenConnect and CSharp Streamer to ALPHV Ransomware Deployment BlackCat Cobalt Strike IcedID |
2023-06-09
⋅
Elastic
⋅
Elastic charms SPECTRALVIPER |
2023-06-09
⋅
Elastic
⋅
Elastic charms SPECTRALVIPER SPECTRALVIPER |
2023-06-09
⋅
cocomelonc
⋅
Malware development trick - part 33. Syscalls - part 2. Simple C++ example. |
2023-06-09
⋅
ConnectWise
⋅
SmashJacker (ChromeLoader variant) Choziosi |
2023-06-08
⋅
Twitter (@embee_research)
⋅
Practical Queries for Identifying Malware Infrastructure: An informal page for storing Censys/Shodan queries Amadey AsyncRAT Cobalt Strike QakBot Quasar RAT Sliver solarmarker |