Click here to download all references as Bib-File.•
2020-12-15
⋅
Google Project Zero
⋅
A deep dive into an NSO zero-click iMessage exploit: Remote Code Execution Chrysaor |
2020-12-15
⋅
Cyborg Security
⋅
Threat Hunt Deep Dives: SolarWinds Supply Chain Compromise (Solorigate / SUNBURST Backdoor) SUNBURST |
2020-12-02
⋅
GoSecure
⋅
Deep Dive into an Obfuscation-as-a-Service for Android Malware Geost |
2020-11-21
⋅
vxhive blog
⋅
Deep Dive Into HERMES Ransomware Hermes |
2020-11-14
⋅
Medium 0xastrovax
⋅
Deep Dive Into Ryuk Ransomware Hermes Ryuk |
2020-10-28
⋅
Microsoft
⋅
Cyberattacks target international conference attendees (APT35/PHOSPHORUS) |
2020-10-27
⋅
Zscaler
⋅
APT-31 leverages COVID-19 vaccine theme and abuses legitimate online services |
2020-10-13
⋅
Fortinet
⋅
Deep Analysis – The EKING Variant of Phobos Ransomware Phobos |
2020-10-12
⋅
DeepInstinct
⋅
Why Emotet’s Latest Wave is Harder to Catch Than Ever Before – Part 2 Emotet |
2020-09-30
⋅
House Permanent Select Committee on Intelligence
⋅
The China Deep Dive: A Report on the Intelligence Community’s Capabilities and Competencies with Respect to the People’s Republic of China |
2020-09-29
⋅
Zscaler
⋅
Targeted Attacks on Oil and Gas Supply Chain Industries in the Middle East Azorult |
2020-08-25
⋅
Aqua Nautilus
⋅
Deep Analysis of TeamTNT Techniques Using Container Images to Attack TeamTNT Tsunami XMRIG |
2020-08-12
⋅
DeepInstinct
⋅
Why Emotet’s Latest Wave is Harder to Catch than Ever Before Emotet |
2020-07-24
⋅
Medium (@velasco.l.n)
⋅
Exorcist Ransomware - From triaging to deep dive Exorcist |
2020-07-17
⋅
Zscaler
⋅
New Voicemail-Themed Phishing Attacks Use Evasion Techniques and Steal Credentials |
2020-07-15
⋅
N1ght-W0lf Blog
⋅
Deep Analysis of QBot Banking Trojan QakBot |
2020-07-13
⋅
Cofense
⋅
Fell Deeds Awake |
2020-07-10
⋅
Zscaler
⋅
Deep Dive Into the M00nD3V Logger M00nD3V Logger |
2020-07-09
⋅
ESET Research
⋅
More evil: A deep look at Evilnum and its toolset EVILNUM More_eggs EVILNUM TerraPreter TerraStealer TerraTV Evilnum |
2020-07-08
⋅
COLUMBIA | SIPA
⋅
Named But Hardly Shamed: What is the Impact of Information Disclosures on an APT Operations? |