Click here to download all references as Bib-File.•
2022-08-25
⋅
Expel
⋅
MORE_EGGS and Some LinkedIn Resumé Spearphishing More_eggs |
2022-08-25
⋅
OALabs
⋅
SmokeLoader Triage Taking a look how Smoke Loader works SmokeLoader |
2022-08-25
⋅
Darktrace
⋅
Detecting the Unknown: Revealing Uncategorized Ransomware Using Darktrace BlackByte |
2022-08-25
⋅
Trend Micro
⋅
New Golang Ransomware Agenda Customizes Attacks (IoCs) AgendaCrypt |
2022-08-25
⋅
Trend Micro
⋅
New Golang Ransomware Agenda Customizes Attacks AgendaCrypt |
2022-08-25
⋅
Group-IB
⋅
Roasting 0ktapus: The phishing campaign going after Okta identity credentials |
2022-08-25
⋅
SentinelOne
⋅
BlueSky Ransomware | AD Lateral Movement, Evasion and Fast Encryption Put Threat on the Radar BlueSky Cobalt Strike JuicyPotato |
2022-08-25
⋅
splunk
⋅
AppLocker Rules as Defense Evasion: Complete Analysis Azorult |
2022-08-25
⋅
Palo Alto Networks Unit 42
⋅
Threat Assessment: Black Basta Ransomware Black Basta |
2022-08-25
⋅
K7 Security
⋅
BleachGap Revamped BleachGap |
2022-08-25
⋅
Kaspersky
⋅
Kimsuky’s GoldDragon cluster and its C2 operations |
2022-08-25
⋅
Github (muha2xmad)
⋅
Thread about the content of IRATA malicious APK IRATA |
2022-08-24
⋅
Trend Micro
⋅
Ransomware Actor Abuses Genshin Impact Anti-Cheat Driver to Kill Antivirus Babuk |
2022-08-24
⋅
Deep instinct
⋅
The Dark Side of Bumblebee Malware Loader BumbleBee |
2022-08-24
⋅
CrowdStrike
⋅
The Anatomy of Wiper Malware, Part 2: Third-Party Drivers |
2022-08-24
⋅
Trend Micro
⋅
Ransomware Actor Abuses Genshin Impact Anti-Cheat Driver to Kill Antivirus (IoCs) Babuk |
2022-08-24
⋅
Trend Micro
⋅
Looking into the Void - Targeting Bulletproof Hosts to Block Attacks Early in the Kill Chain |
2022-08-24
⋅
Microsoft
⋅
Looking for the ‘Sliver’ lining: Hunting for emerging command-and-control frameworks BumbleBee Sliver |
2022-08-24
⋅
Github (rad9800)
⋅
Malware Madness: EXCEPTION edition Dridex |
2022-08-24
⋅
Microsoft
⋅
MagicWeb: NOBELIUM’s post-compromise trick to authenticate as anyone |