Click here to download all references as Bib-File.•
| 2022-02-09
⋅
SentinelOne
⋅
Modified Elephant APT and a Decade of Fabricating Evidence DarkComet Incubator NetWire RC |
| 2022-02-09
⋅
Sentinel LABS
⋅
ModifiedElephant APT and a Decade of Fabricating Evidence DarkComet Incubator NetWire RC ModifiedElephant |
| 2022-02-04
⋅
Medium tomiwa-xy
⋅
Static analysis of Goldenhelper Malware (Golden Tax malware) GoldenHelper |
| 2022-02-03
⋅
Symantec
⋅
Antlion: Chinese APT Uses Custom Backdoor to Target Financial Institutions in Taiwan MimiKatz xPack Antlion |
| 2022-02-02
⋅
Cado Security
⋅
CoinStomp Malware Family Targets Asian Cloud Service Providers |
| 2022-02-01
⋅
Cybereason
⋅
StrifeWater RAT: Iranian APT Moses Staff Adds New Trojan to Ransomware Operations StrifeWater RAT MosesStaff |
| 2022-01-31
⋅
CyberArk
⋅
Analyzing Malware with Hooks, Stomps and Return-addresses Cobalt Strike |
| 2022-01-28
⋅
Atomic Matryoshka
⋅
Malware Headliners: LokiBot Loki Password Stealer (PWS) |
| 2022-01-22
⋅
Atomic Matryoshka
⋅
Malware Headliners: Emotet Emotet |
| 2022-01-15
⋅
Microsoft
⋅
Malware attacks targeting Ukraine government (DEV-0586) WhisperGate |
| 2022-01-15
⋅
Atomic Matryoshka
⋅
Malware Headliners: Qakbot QakBot |
| 2022-01-09
⋅
Atomic Matryoshka
⋅
Malware Headliners: Dridex Dridex |
| 2022-01-02
⋅
Atomic Matryoshka
⋅
"Cracking Open the Malware Piñata" Series: Intro to Dynamic Analysis with RedLineStealer RedLine Stealer |
| 2022-01-02
⋅
Medium amgedwageh
⋅
Automating The Analysis Of An AutoIT Script That Wraps A Remcos RAT Remcos |
| 2022-01-01
⋅
Toli Security
⋅
Cryptomining botnet exploiting exposed Docker API |
| 2021-12-29
⋅
Aqua
⋅
Threat Alert: Evolving Attack Techniques of Autom Cryptomining Campaign |
| 2021-12-16
⋅
TEAMT5
⋅
Winnti is Coming - Evolution after Prosecution Cobalt Strike FishMaster FunnySwitch HIGHNOON ShadowPad Spyder |
| 2021-12-12
⋅
Sophos
⋅
Log4Shell Hell: anatomy of an exploit outbreak |
| 2021-12-06
⋅
Microsoft
⋅
Protecting people from recent cyberattacks |
| 2021-12-02
⋅
Microsoft
⋅
Structured threat hunting: One way Microsoft Threat Experts prioritizes customer defense |