Click here to download all references as Bib-File.•
2021-08-16
⋅
Trend Micro
⋅
LockBit Resurfaces With Version 2.0 Ransomware Detections in Chile, Italy, Taiwan, UK LockBit |
2021-08-10
⋅
Trend Micro
⋅
Chaos Ransomware: A Proof of Concept With Potentially Dangerous Applications Chaos |
2021-08-09
⋅
Trend Micro
⋅
Cinobi Banking Trojan Targets Cryptocurrency Exchange Users via Malvertising Cinobi |
2021-08-04
⋅
Trend Micro
⋅
Supply Chain Attacks from a Managed Detection and Response Perspective REvil |
2021-07-27
⋅
Trend Micro
⋅
Threat Actors Exploit Misconfigured Apache Hadoop YARN Kinsing |
2021-07-22
⋅
⋅
Trend Micro
⋅
Analysis of "[Urgent] Damage report regarding the occurrence of cyber attacks, etc. associated with the Tokyo Olympics.exe" VIGILANT CLEANER |
2021-07-22
⋅
Trend Micro
⋅
Updated XCSSET Malware Targets Telegram, Other Apps XCSSET |
2021-07-21
⋅
Trend Micro
⋅
StrongPity APT Group Deploys Android Malware for the First Time |
2021-07-20
⋅
Trend Micro
⋅
Tracking the Activities of TeamTNT: A Closer Look at a Cloud-Focused Malicious Actor Group TeamTNT |
2021-07-07
⋅
Trend Micro
⋅
BIOPASS RAT: New Malware Sniffs Victims via Live Streaming BIOPASS Cobalt Strike Derusbi |
2021-07-05
⋅
Trend Micro
⋅
Tracking Cobalt Strike: A Trend Micro Vision One Investigation Cobalt Strike |
2021-07-01
⋅
Trend Micro
⋅
PurpleFox Using WPAD to Target Indonesian Users PurpleFox |
2021-06-28
⋅
Trend Micro
⋅
Nefilim Ransomware Attack Through a MITRE Att&ck Lens Nefilim |
2021-06-22
⋅
Trend Micro
⋅
NukeSped Copies Fileless Code From Bundlore, Leaves It Unused Bundlore |
2021-06-17
⋅
Trend Micro
⋅
Bash Ransomware DarkRadiation Targets Red Hat- and Debian-based Linux Distributions |
2021-06-15
⋅
Trend Micro
⋅
Ransomware Double Extortion and Beyond: REvil, Clop, and Conti Clop Conti REvil |
2021-06-08
⋅
Trend Micro
⋅
Modern Ransomware’s Double Extortion Tactics and How to Protect Enterprises Against Them Nefilim |
2021-06-02
⋅
Trend Micro
⋅
Taking Advantage of PE Metadata,or How To Complete your Favorite ThreatActor’s Sample Collection (Paper) HyperSSL |
2021-06-02
⋅
Trend Micro
⋅
Taking Advantage of PE Metadata, or How To Complete Your Favorite Threat Actor’s Sample Collection HyperSSL |
2021-05-28
⋅
Trend Micro
⋅
DarkSide on Linux: Virtual Machines Targeted DarkSide |