Click here to download all references as Bib-File.•
2022-09-24
⋅
Cyber And Ramen blog
⋅
So Long (Go)Daddy | Tracking BlackTech Infrastructure |
2022-09-23
⋅
Kaspersky
⋅
Mass email campaign with a pinch of targeted spam Agent Tesla |
2022-09-22
⋅
SentinelOne
⋅
The Mystery of Metador | An Unattributed Threat Hiding in Telcos, ISPs, and Universities Metador |
2022-09-22
⋅
Seriously Risky Business
⋅
Recent Cyber Chaos is a Structural Shift Guacamaya |
2022-09-22
⋅
ComputerWeekly
⋅
ALPHV/BlackCat ransomware family becoming more dangerous BlackCat BlackCat FIN7 |
2022-09-22
⋅
AhnLab
⋅
Analysis Report on Lazarus Group's Rootkit Attack Using BYOVD FudModule |
2022-09-22
⋅
Medium s2wlab
⋅
Quick Overview of Leaked LockBit 3.0 (Black) builder program LockBit |
2022-09-22
⋅
CISA
⋅
Alert (AA22-265A) Control System Defense: Know the Opponent |
2022-09-22
⋅
Twitter (@sekoia_io)
⋅
Tweets on Lumma stealer Lumma Stealer |
2022-09-22
⋅
SentinelOne
⋅
The Mystery of Metador | An Unattributed Threat Hiding in Telcos, ISPs, and Universities |
2022-09-22
⋅
deepwatch
⋅
Is Gootloader Working with a Foreign Intelligence Service? GootKit |
2022-09-22
⋅
Check Point
⋅
7 Years of Scarlet Mimic’s Mobile Surveillance Campaign Targeting Uyghurs MobileOrder |
2022-09-22
⋅
Recorded Future
⋅
Chinese State-Sponsored Group TA413 Adopts New Capabilities in Pursuit of Tibetan Targets 8.t Dropper LOWZERO |
2022-09-22
⋅
Broadcom
⋅
Noberus Ransomware: Darkside and BlackMatter Successor Continues to Evolve its Tactics BlackCat BlackMatter DarkSide |
2022-09-22
⋅
Cyber Geeks
⋅
A Technical Analysis Of The Leaked LOCKBIT 3.0 Builder LockBit |
2022-09-22
⋅
Avast
⋅
Raspberry Robin’s Roshtyak: A Little Lesson in Trickery Raspberry Robin Roshtyak |
2022-09-21
⋅
Gdata
⋅
Identifying file manipulation in system files |
2022-09-21
⋅
Microsoft
⋅
Rewards plus: Fake mobile banking rewards apps lure users to install info-stealing RAT on Android devices |
2022-09-21
⋅
Check Point
⋅
Native function and Assembly Code Invocation MiniDuke |
2022-09-20
⋅
vmware
⋅
Threat Research: New Method of Volume Shadow Backup Deletion Seen in Recent Ransomware |