Click here to download all references as Bib-File.•
2022-08-30
⋅
eSentire
⋅
Hacker Infrastructure Used in Cisco Breach Discovered Attacking a Top Workforce Management Corporation & an Affiliate of Russia’s Evil Corp Gang Suspected, Reports eSentire Cobalt Strike FiveHands UNC2447 |
2022-08-30
⋅
SecurityScorecard
⋅
Brute Force Attempts May Have Preceded Ransomware Attack on School District |
2022-08-30
⋅
Github (vc0RExor)
⋅
SmokeLoader - Quick-Analysis SmokeLoader |
2022-08-30
⋅
CYBER GEEKS All Things Infosec
⋅
ChromeLoader Browser Hijacker Choziosi |
2022-08-30
⋅
Proofpoint
⋅
Rising Tide: Chasing the Currents of Espionage in the South China Sea scanbox Meterpreter APT40 |
2022-08-29
⋅
Sekoia
⋅
Traffers: a deep dive into the information stealer ecosystem MetaStealer PrivateLoader Raccoon RedLine Stealer Vidar |
2022-08-29
⋅
Securonix
⋅
Securonix Threat Labs Security Advisory: New Golang Attack Campaign GO#WEBBFUSCATOR Leverages Office Macros and James Webb Images to Infect Systems |
2022-08-29
⋅
Cyfirma
⋅
CosmicDuke Malware Analysis Report CosmicDuke |
2022-08-29
⋅
Palo Alto Networks Unit 42
⋅
Tor 101: How Tor Works and its Risks to the Enterprise |
2022-08-29
⋅
Netskope
⋅
AsyncRAT: Using Fully Undetected Downloader AsyncRAT |
2022-08-29
⋅
CYBER GEEKS All Things Infosec
⋅
A Technical Analysis of Pegasus for Android – Part 1 Chrysaor |
2022-08-29
⋅
McAfee
⋅
Malicious Cookie Stuffing Chrome Extensions with 1.4 Million Users |
2022-08-29
⋅
Check Point
⋅
Check Point Research detects Crypto Miner malware disguised as Google translate desktop and other legitimate applications Nitrokod |
2022-08-28
⋅
BleepingComputer
⋅
LockBit ransomware gang gets aggressive with triple-extortion tactic LockBit |
2022-08-26
⋅
Malware development: persistence - part 9. Default file extension hijacking. Simple C++ example. Kimsuky |
2022-08-25
⋅
DataBreaches.net
⋅
Major Indonesia tollroad operator hacked by DESORDEN (Updated) Desorden Group |
2022-08-25
⋅
Palo Alto Networks Unit 42
⋅
Threat Assessment: Black Basta Ransomware Black Basta QakBot |
2022-08-25
⋅
Resecurity
⋅
COVID-19 Data Put For Sale In Dark Web |
2022-08-25
⋅
Bitdefender
⋅
Hiding in the Shadows: Investigation of a Corporate Espionage Attack |
2022-08-25
⋅
⋅
SK Shieldus
⋅
Ghost Ransomware Response and Attack Analysis Report Gwisin |