Click here to download all references as Bib-File.•
2021-05-28
⋅
CISA
⋅
Alert (AA21-148A): Sophisticated Spearphishing Campaign Targets Government Organizations, IGOs, and NGOs Cobalt Strike |
2021-05-25
⋅
FireEye
⋅
Crimes of Opportunity: Increasing Frequency of Low Sophistication Operational Technology Compromises |
2021-05-18
⋅
Elastic
⋅
ProblemChild: Detecting living-off-the-land attacks using the Elastic Stack |
2021-05-13
⋅
⋅
AhnLab
⋅
APT attack for domestic companies using library files ImprudentCook |
2021-05-07
⋅
Department of Justice
⋅
Four Individuals Plead Guilty to RICO Conspiracy Involving “Bulletproof Hosting” for Cybercriminals Citadel SpyEye Zeus |
2021-04-29
⋅
FireEye
⋅
UNC2447 SOMBRAT and FIVEHANDS Ransomware: A Sophisticated Financial Threat Cobalt Strike FiveHands HelloKitty |
2021-04-20
⋅
Elastic
⋅
How attackers abuse Access Token Manipulation (ATT&CK T1134) |
2021-04-16
⋅
US Department of Justice
⋅
High-level organizer of notorious hacking group FIN7 sentenced to ten years in prison for scheme that compromised tens of millions of debit and credit cards |
2021-04-13
⋅
Department of Justice
⋅
Justice Department announces court-authorized effort to disrupt exploitation of Microsoft Exchange Server vulnerabilities |
2021-03-27
⋅
InfoSec Handlers Diary Blog
⋅
Malware Analysis with elastic-agent and Microsoft Sandbox |
2021-03-18
⋅
Elastic
⋅
Hunting for Lateral Movement using Event Query Language |
2021-03-16
⋅
Elastic
⋅
Detecting Cobalt Strike with memory signatures Cobalt Strike |
2021-03-16
⋅
Department of Homeland Security
⋅
Foreign Interference Targeting Election Infrastructure or Political Organization, Campaign, or Candidate InfrastructureRelated to the 2020 US Related to the 2020 US Federal Elections |
2021-03-11
⋅
Elastic
⋅
Update - Detection and Response for HAFNIUM Activity |
2021-03-09
⋅
Morphisec
⋅
MineBridge Is on the Rise, With a Sophisticated Delivery Mechanism MINEBRIDGE |
2021-03-09
⋅
360 netlab
⋅
Threat Alert: z0Miner Is Spreading quickly by Exploiting ElasticSearch and Jenkins Vulnerabilities |
2021-03-05
⋅
Forcepoint
⋅
Advancements in Invoicing - A highly sophisticated way to distribute ZLoader Zloader |
2021-03-04
⋅
Elastic
⋅
Detection and Response for HAFNIUM Activity HAFNIUM |
2021-03-04
⋅
Microsoft
⋅
GoldMax, GoldFinder, and Sibot: Analyzing NOBELIUM’s layered persistence SUNBURST TEARDROP UNC2452 |
2021-03-02
⋅
Microsoft
⋅
HAFNIUM targeting Exchange Servers with 0-day exploits CHINACHOPPER HAFNIUM |