Click here to download all references as Bib-File.•
2022-08-30
⋅
eSentire
⋅
Hacker Infrastructure Used in Cisco Breach Discovered Attacking a Top Workforce Management Corporation & an Affiliate of Russia’s Evil Corp Gang Suspected, Reports eSentire Cobalt Strike FiveHands UNC2447 |
2022-08-30
⋅
SecurityScorecard
⋅
Brute Force Attempts May Have Preceded Ransomware Attack on School District |
2022-08-30
⋅
Cisco
⋅
ModernLoader delivers multiple stealers, cryptominers and RATs Coinminer DCRat ModernLoader RedLine Stealer SapphireMiner SystemBC |
2022-08-30
⋅
Medium the_abjuri5t
⋅
NanoCore RAT Hunting Guide Nanocore RAT |
2022-08-29
⋅
Sekoia
⋅
Traffers: a deep dive into the information stealer ecosystem MetaStealer PrivateLoader Raccoon RedLine Stealer Vidar |
2022-08-29
⋅
Securonix
⋅
Securonix Threat Labs Security Advisory: New Golang Attack Campaign GO#WEBBFUSCATOR Leverages Office Macros and James Webb Images to Infect Systems |
2022-08-29
⋅
Netskope
⋅
AsyncRAT: Using Fully Undetected Downloader AsyncRAT |
2022-08-29
⋅
Soc Investigation
⋅
Remcos RAT New TTPS - Detection & Response Remcos |
2022-08-29
⋅
AT&T
⋅
Crypto miners’ latest techniques |
2022-08-29
⋅
Check Point
⋅
Check Point Research detects Crypto Miner malware disguised as Google translate desktop and other legitimate applications Nitrokod |
2022-08-25
⋅
DataBreaches.net
⋅
Major Indonesia tollroad operator hacked by DESORDEN (Updated) Desorden Group |
2022-08-25
⋅
Palo Alto Networks Unit 42
⋅
Threat Assessment: Black Basta Ransomware Black Basta QakBot |
2022-08-25
⋅
Resecurity
⋅
COVID-19 Data Put For Sale In Dark Web |
2022-08-25
⋅
Bitdefender
⋅
Hiding in the Shadows: Investigation of a Corporate Espionage Attack |
2022-08-25
⋅
⋅
SK Shieldus
⋅
Ghost Ransomware Response and Attack Analysis Report Gwisin |
2022-08-25
⋅
Darktrace
⋅
Detecting the Unknown: Revealing Uncategorized Ransomware Using Darktrace BlackByte |
2022-08-25
⋅
Trend Micro
⋅
New Golang Ransomware Agenda Customizes Attacks (IoCs) AgendaCrypt |
2022-08-25
⋅
Trend Micro
⋅
New Golang Ransomware Agenda Customizes Attacks AgendaCrypt |
2022-08-25
⋅
SentinelOne
⋅
BlueSky Ransomware | AD Lateral Movement, Evasion and Fast Encryption Put Threat on the Radar BlueSky Cobalt Strike JuicyPotato |
2022-08-25
⋅
splunk
⋅
AppLocker Rules as Defense Evasion: Complete Analysis Azorult |