Click here to download all references as Bib-File.•
2022-10-10
⋅
RiskIQ
⋅
DEV-0832 Leverages Commodity Tools in Opportunistic Ransomware Campaigns BlackCat Mount Locker SystemBC Zeppelin |
2022-10-08
⋅
Github (itaymigdal)
⋅
Nimbo-C2 - A new C2 Framework Nimbo-C2 Nimbo-C2 |
2022-10-07
⋅
ISC
⋅
Powershell Backdoor with DGA Capability FTCODE |
2022-10-07
⋅
Checkmarx
⋅
LofyGang – Software Supply Chain Attackers; Organized, Persistent, and Operating for Over a Year LofyGang |
2022-10-07
⋅
YouTube (BSides Portland)
⋅
SmokeLoader - The Pandora's box of Tricks SmokeLoader |
2022-10-06
⋅
Trellix
⋅
Evolution of BazarCall Social Engineering Tactics BazarBackdoor BazarCall |
2022-10-06
⋅
YouTube ( BSides Budapest IT Security Conference)
⋅
DiceyF deploys GamePlayerFramework (Video) GamePlayerFramework |
2022-10-06
⋅
Blackberry
⋅
Mustang Panda Abuses Legitimate Apps to Target Myanmar Based Victims PlugX |
2022-10-06
⋅
Twitter (@ESETresearch)
⋅
Tweet on Bumblebee being modularized like trickbot BumbleBee |
2022-10-05
⋅
Zscaler
⋅
Analysis of LilithBot Malware and Eternity Threat Group Eternity Clipper Eternity Stealer Lilith |
2022-10-05
⋅
Microsoft
⋅
Detecting and preventing LSASS credential dumping attacks |
2022-10-05
⋅
4pfsec
⋅
Havoc C2: First look Havoc |
2022-10-05
⋅
BitSight
⋅
Sinkholing PseudoManuscrypt: From Zero To 50k Infections - Part 1 PrivateLoader PseudoManuscrypt |
2022-10-04
⋅
Rewterz Information Security
⋅
Rewterz Threat Alert – KONNI APT Group – Active IOCs Konni Opal Sleet |
2022-10-04
⋅
Twitter (@sekoia_io)
⋅
Tweets detailing operation of Erbium stealer Erbium Stealer |
2022-10-04
⋅
Sophos
⋅
Remove All The Callbacks – BlackByte Ransomware Disables EDR Via RTCore64.sys Abuse BlackByte |
2022-10-04
⋅
CISA
⋅
Alert (AA22-277A) Impacket and Exfiltration Tool Used to Steal Sensitive Information from Defense Industrial Base Organization |
2022-10-04
⋅
splunk
⋅
Deliver a Strike by Reversing a Badger: Brute Ratel Detection and Analysis Brute Ratel C4 |
2022-10-03
⋅
Check Point Research
⋅
3rd October – Threat Intelligence Report Guacamaya |
2022-10-03
⋅
vmware
⋅
Emotet Exposed: A Look Inside the Cybercriminal Supply Chain Emotet |