Click here to download all references as Bib-File.•
2023-06-15
⋅
Cado Security
⋅
Tracking Diicot: an emerging Romanian threat actor |
2023-06-14
⋅
PICUS Security
⋅
Picus Cyber Threat Intelligence Report May 2023: Top 10 MITRE ATT&CK Techniques Earth Longzhi |
2023-06-14
⋅
VulnCheck
⋅
Fake Security Researcher GitHub Repositories Deliver Malicious Implant TorLoader |
2023-06-14
⋅
CISA
⋅
Understanding Ransomware Threat Actors: Lockbit LockBit |
2023-06-12
⋅
⋅
NTT Security
⋅
About PowerHarbor, a new malware used by SteelClover PowerHarbor |
2023-06-08
⋅
⋅
AhnLab
⋅
Lazarus Group exploiting vulnerabilities in domestic financial security solutions LazarDoor LazarLoader |
2023-06-06
⋅
Security Intelligence
⋅
ITG10 Likely Targeting South Korean Entities of Interest to the Democratic People’s Republic of Korea (DPRK) RokRAT |
2023-06-01
⋅
K7 Security
⋅
Encrypted Chaos: Analysis of Crytox Ransomware Crytox |
2023-05-30
⋅
IBM Security
⋅
BlackCat (ALPHV) ransomware levels up for stealth, speed and exfiltration BlackCat BlackCat |
2023-05-16
⋅
KrebsOnSecurity
⋅
Russian Hacker “Wazawaka” Indicted for Ransomware Babuk Hive LockBit LockBit Babuk Hive LockBit |
2023-05-10
⋅
K7 Security
⋅
spynote SpyNote |
2023-05-10
⋅
Dragos
⋅
Deconstructing a Cybersecurity Event |
2023-05-09
⋅
YouTube (Security BSides London)
⋅
Detection At Scale |
2023-05-04
⋅
SecurityScorecard
⋅
How to Analyze Java Malware – A Case Study of STRRAT STRRAT |
2023-05-02
⋅
Trend Micro
⋅
Attack on Security Titans: Earth Longzhi Returns With New Tricks Croxloader SPHijacker Earth Longzhi |
2023-04-27
⋅
ReversingLabs
⋅
The Week in Security: A possible Colonial Pipeline 2.0, ransomware takes bite out of American eateries Zarya |
2023-04-25
⋅
Elastic
⋅
Elastic Security Labs discovers the LOBSHOT malware LOBSHOT |
2023-04-21
⋅
K7 Security
⋅
MuddyWaters back with DarkBit DarkBit |
2023-04-20
⋅
3CX
⋅
Security Update Thursday 20 April 2023 – Initial Intrusion Vector Found POOLRAT |
2023-04-18
⋅
KrebsOnSecurity
⋅
Giving a Face to the Malware Proxy Service ‘Faceless’ |