Click here to download all references as Bib-File.•
2022-07-06
⋅
Intezer
⋅
OrBit: New Undetected Linux Threat Uses Unique Hijack of Execution Flow HiddenWasp OrBit Symbiote |
2022-07-05
⋅
Soc Investigation
⋅
QBot Spreads via LNK Files – Detection & Response QakBot |
2022-07-05
⋅
Microsoft
⋅
Hive ransomware gets upgrades in Rust Hive |
2022-07-05
⋅
SECUINFRA
⋅
Whatever floats your Boat – Bitter APT continues to target Bangladesh AlmondRAT Artra Downloader Bitter RAT ZxxZ |
2022-07-05
⋅
JPCERT/CC
⋅
VSingle malware that obtains C2 server information from GitHub VSingle |
2022-07-04
⋅
Bleeping Computer
⋅
AstraLocker ransomware shuts down and releases decryptors AstraLocker |
2022-07-01
⋅
RiskIQ
⋅
ToddyCat: A Guided Journey through the Attacker's Infrastructure ShadowPad ToddyCat |
2022-06-30
⋅
CYBER GEEKS All Things Infosec
⋅
How to Expose a Potential Cybercriminal due to Misconfigurations Loki Password Stealer (PWS) |
2022-06-30
⋅
Microsoft
⋅
Using process creation properties to catch evasion techniques |
2022-06-30
⋅
Blackberry
⋅
Threat Thursday: China-Based APT Plays Auto-Updater Card to Deliver WinDealer Malware WinDealer Red Nue |
2022-06-30
⋅
Google
⋅
Countering hack-for-hire groups Void Balaur |
2022-06-30
⋅
Cyber Geeks (CyberMasterV)
⋅
How to Expose a Potential Cybercriminal due to Misconfigurations Loki Password Stealer (PWS) |
2022-06-30
⋅
Trend Micro
⋅
Black Basta Ransomware Operators Expand Their Attack Arsenal With QakBot Trojan and PrintNightmare Exploit Black Basta Cobalt Strike QakBot |
2022-06-30
⋅
Microsoft
⋅
Toll fraud malware: How an Android application can drain your wallet Joker |
2022-06-29
⋅
Sekoia
⋅
Raccoon Stealer v2 – Part 2: In-depth analysis Raccoon |
2022-06-29
⋅
Team Cymru
⋅
The Sliding Scale of Threat Actor Sophistication When Reacting to 0-day Vulnerabilities |
2022-06-29
⋅
vmware
⋅
Lateral Movement in the Real World: A Quantitative Analysis |
2022-06-29
⋅
Group-IB
⋅
Fat Cats - An analysis of the BlackCat ransomware affiliate program BlackCat BlackCat |
2022-06-28
⋅
Sekoia
⋅
Raccoon Stealer v2 – Part 1: The return of the dead Raccoon |
2022-06-28
⋅
Accenture
⋅
Steal(Bit) or exfil, what does it (Ex)Matter? Comparative Analysis of Custom Exfiltration Tools ExMatter StealBit |