Click here to download all references as Bib-File.•
2022-03-31
⋅
CrowdStrike
⋅
Cloudy with a Chance of Unclear Mailbox Sync: CrowdStrike Services Identifies Logging Inconsistencies in Microsoft 365 |
2022-03-31
⋅
CrowdStrike
⋅
Cloudy with a Chance of Unclear Mailbox Sync: CrowdStrike Services Identifies Logging Inconsistencies in Microsoft 365 |
2022-03-25
⋅
GOV.UA
⋅
Who is behind the Cyberattacks on Ukraine's Critical Information Infrastructure: Statistics for March 15-22 Xloader Agent Tesla CaddyWiper Cobalt Strike DoubleZero GraphSteel GrimPlant HeaderTip HermeticWiper IsaacWiper MicroBackdoor Pandora RAT |
2022-03-24
⋅
ESET Research
⋅
Crypto malware in patched wallets targeting Android and iOS devices |
2022-03-18
⋅
Vice Motherboard
⋅
Open Source Maintainer Sabotages Code to Wipe Russian, Belarusian Computers PeaceNotWar |
2022-03-16
⋅
Cisco
⋅
Preparing for denial-of-service attacks with Talos Incident Response |
2022-03-16
⋅
Microsoft
⋅
Uncovering Trickbot’s use of IoT devices in command-and-control infrastructure TrickBot |
2022-03-16
⋅
Microsoft
⋅
Uncovering Trickbot’s use of IoT devices in command-and-control infrastructure TrickBot |
2022-02-24
⋅
RiskIQ
⋅
RiskIQ: WatchGuard Devices Targeted by Cyclops Blink Malware |
2022-02-16
⋅
Trend Micro
⋅
SMS PVA Services' Use of Infected Android Phones Reveals Flaws in SMS Verification Guerrilla |
2022-02-16
⋅
Trend Micro
⋅
SMS PVA Services' Use of Infected Android Phones Reveals Flaws in SMS Verification Guerrilla |
2022-02-16
⋅
Trend Micro
⋅
SMS PVA Services' Use of Infected Android Phones Reveals Flaws in SMS Verification Guerrilla |
2022-02-16
⋅
Trend Micro
⋅
SMS PVA Services' Use of Infected Android Phones Reveals Flaws in SMS Verification Guerrilla |
2022-02-16
⋅
Trend Micro
⋅
SMS PVA Services' Use of Infected Android Phones Reveals Flaws in SMS Verification Guerrilla |
2022-02-16
⋅
Välisluureamet Estonian Foreign Intelligence Service
⋅
International Security and Estonia 2022 |
2022-02-15
⋅
0ffset Blog
⋅
MATANBUCHUS: Another Loader As A Service Malware Matanbuchus |
2022-02-14
⋅
Darktrace
⋅
Staying ahead of REvil’s Ransomware-as-a-Service business model REvil REvil |
2022-02-11
⋅
JOINT CYBERSECURITY ADVISORY: Indicators of Compromise Associated with BlackByte Ransomware BlackByte |
2022-02-08
⋅
Trellix
⋅
BlackCat Ransomware as a Service - The Cat is certainly out of the bag! BlackCat BlackCat |
2022-02-03
⋅
RiskIQ
⋅
RiskIQ: Exposed QNAP Devices are Vulnerable to Compromise DEADBOLT |