Click here to download all references as Bib-File.•
2022-08-25
⋅
Palo Alto Networks Unit 42
⋅
Threat Assessment: Black Basta Ransomware Black Basta |
2022-08-25
⋅
Microsoft
⋅
MERCURY leveraging Log4j 2 vulnerabilities in unpatched systems to target Israeli organizations MimiKatz |
2022-08-25
⋅
muha2xmad
⋅
Technical analysis of IRATA android malware IRATA |
2022-08-25
⋅
Kaspersky
⋅
Kimsuky’s GoldDragon cluster and its C2 operations |
2022-08-25
⋅
Github (muha2xmad)
⋅
Thread about the content of IRATA malicious APK IRATA |
2022-08-24
⋅
Trend Micro
⋅
Ransomware Actor Abuses Genshin Impact Anti-Cheat Driver to Kill Antivirus Babuk |
2022-08-24
⋅
Deep instinct
⋅
The Dark Side of Bumblebee Malware Loader BumbleBee |
2022-08-24
⋅
CrowdStrike
⋅
The Anatomy of Wiper Malware, Part 2: Third-Party Drivers |
2022-08-24
⋅
Trend Micro
⋅
Ransomware Actor Abuses Genshin Impact Anti-Cheat Driver to Kill Antivirus (IoCs) Babuk |
2022-08-24
⋅
Trend Micro
⋅
Looking into the Void - Targeting Bulletproof Hosts to Block Attacks Early in the Kill Chain |
2022-08-24
⋅
Microsoft
⋅
MagicWeb: NOBELIUM’s post-compromise trick to authenticate as anyone |
2022-08-23
⋅
Palo Alto Networks Unit 42
⋅
Legitimate SaaS Platforms Being Used to Host Phishing Attacks |
2022-08-23
⋅
Zscaler
⋅
Making victims pay, infostealer malwares mimick pirated-software download sites RedLine Stealer |
2022-08-23
⋅
Google
⋅
New Iranian APT data extraction tool HYPERSCRAPE |
2022-08-22
⋅
Medium (Katie’s Five Cents)
⋅
A Cyber Threat Intelligence Self-Study Plan: Part 2 |
2022-08-21
⋅
Perception Point
⋅
Behind the Attack: Remcos RAT Remcos |
2022-08-19
⋅
vmware
⋅
How to Replicate Emotet Lateral Movement Emotet |
2022-08-19
⋅
wordfence
⋅
Analyzing Attack Data and Trends Targeting Ukrainian Domains |
2022-08-19
⋅
Cybereason
⋅
THREAT ALERT: Inside the Redeemer 2.0 Ransomware |
2022-08-19
⋅
nccgroup
⋅
Back in Black: Unlocking a LockBit 3.0 Ransomware Attack FAKEUPDATES Cobalt Strike LockBit |