Click here to download all references as Bib-File.•
2022-10-28
⋅
Elastic
⋅
EMOTET dynamic config extraction Emotet |
2022-10-27
⋅
Microsoft
⋅
Raspberry Robin worm part of larger ecosystem facilitating pre-ransomware activity FAKEUPDATES BumbleBee Fauppod PhotoLoader Raspberry Robin Roshtyak |
2022-10-25
⋅
Microsoft
⋅
DEV-0832 (Vice Society) opportunistic ransomware campaigns impacting US education sector BlackCat Mount Locker PortStarter Zeppelin Vanilla Tempest |
2022-10-22
⋅
Microsoft
⋅
DEV-0952 deploys Daixin ransomware at hospitals |
2022-10-17
⋅
SecurityScorecard
⋅
A Detailed Analysis of the Gafgyt Malware Targeting IoT Devices Bashlite |
2022-10-14
⋅
Microsoft
⋅
New “Prestige” ransomware impacts organizations in Ukraine and Poland Prestige |
2022-10-06
⋅
YouTube ( BSides Budapest IT Security Conference)
⋅
DiceyF deploys GamePlayerFramework (Video) GamePlayerFramework |
2022-10-05
⋅
Microsoft
⋅
Detecting and preventing LSASS credential dumping attacks |
2022-10-04
⋅
Rewterz Information Security
⋅
Rewterz Threat Alert – KONNI APT Group – Active IOCs Konni Opal Sleet |
2022-10-04
⋅
Rewterz Information Security
⋅
Witchetty APT Group Witchetty |
2022-10-01
⋅
Yahoo Finance
⋅
Analysis-Mexico data hack exposes government cybersecurity vulnerability Guacamaya |
2022-09-30
⋅
Microsoft
⋅
Analyzing attacks using the Exchange vulnerabilities CVE-2022-41040 and CVE-2022-41082 |
2022-09-29
⋅
Microsoft
⋅
ZINC weaponizing open-source software BLINDINGCAN CLOUDBURST miniBlindingCan |
2022-09-29
⋅
NTT
⋅
Report on APT Attacks by BlackTech Bifrost PLEAD TSCookie Flagpro Gh0stTimes SelfMake Loader SPIDERPIG RAT |
2022-09-29
⋅
⋅
GTSC
⋅
Warning Campaign Attack Using Zero Day Vulnerability on Microsoft Exchange Server |
2022-09-28
⋅
Securonix
⋅
Securonix Threat Labs Security Advisory: Detecting STEEP#MAVERICK: New Covert Attack Campaign Targeting Military Contractors |
2022-09-27
⋅
SecurityScorecard
⋅
A Deep Dive Into the APT28’s stealer called CredoMap CredoMap |
2022-09-26
⋅
K7 Security
⋅
DcDcrypt Ransomware Decryptor DcDcrypt |
2022-09-23
⋅
humansecurity
⋅
Poseidon’s Offspring: Charybdis and Scylla |
2022-09-21
⋅
Microsoft
⋅
The art and science behind Microsoft threat hunting: Part 2 |