Click here to download all references as Bib-File.•
2022-08-30
⋅
CYBER GEEKS All Things Infosec
⋅
ChromeLoader Browser Hijacker Choziosi |
2022-08-29
⋅
CYBER GEEKS All Things Infosec
⋅
A Technical Analysis of Pegasus for Android – Part 1 Chrysaor |
2022-08-22
⋅
Medium (Katie’s Five Cents)
⋅
A Cyber Threat Intelligence Self-Study Plan: Part 2 |
2022-08-19
⋅
Resecurity
⋅
Cybercriminals Are Targeting Law Enforcement Agencies Worldwide |
2022-08-19
⋅
Cybereason
⋅
THREAT ALERT: Inside the Redeemer 2.0 Ransomware |
2022-08-18
⋅
Trustwave
⋅
Overview of the Cyber Weapons Used in the Ukraine - Russia War AcidRain CaddyWiper Cobalt Strike CredoMap DCRat DoubleZero GraphSteel GrimPlant HermeticWiper INDUSTROYER2 InvisiMole IsaacWiper PartyTicket |
2022-08-18
⋅
Trustwave
⋅
Overview of the Cyber Weapons Used in the Ukraine - Russia War AcidRain CaddyWiper Cobalt Strike CredoMap DCRat DoubleZero GraphSteel GrimPlant HermeticWiper INDUSTROYER2 InvisiMole IsaacWiper PartyTicket |
2022-08-17
⋅
Cybereason
⋅
Bumblebee Loader – The High Road to Enterprise Domain Control BumbleBee Cobalt Strike |
2022-08-11
⋅
Accenture
⋅
How cybercriminals are weaponizing leaked ransomware data for follow-up attacks |
2022-08-10
⋅
⋅
Cert-UA
⋅
Cyberattacks of the UAC-0010 group (Armageddon): malicious programs GammaLoad, GammaSteel (CERT-UA#5134) Gamaredon Group |
2022-08-10
⋅
Cisco
⋅
Cisco Talos shares insights related to recent cyber attack on Cisco Yanluowang UNC2447 |
2022-08-10
⋅
⋅
Cybersecurity Trends
⋅
“Pegasus”, the spyware for smartphones. How does it work and how can you protect yourself? Chrysaor |
2022-08-03
⋅
CyberScoop
⋅
Environmental hacktivists publish 2 terabytes of mining company emails Guacamaya |
2022-08-03
⋅
Trustwave
⋅
The Price Cybercriminals Charge for Stolen Data |
2022-08-01
⋅
Twitter (@sekoia_io)
⋅
Tweet on Turla's CyberAzov activity CyberAzov |
2022-07-31
⋅
DataBreaches.net
⋅
Thai entities continue to fall prey to cyberattacks and leaks Desorden Group |
2022-07-31
⋅
BushidoToken Blog
⋅
Space Invaders: Cyber Threats That Are Out Of This World Poison Ivy Raindrop SUNBURST TEARDROP WastedLocker |
2022-07-27
⋅
PressTV
⋅
Iraqi hacker group 'ALtahrea Team' targets Israeli IT, e-commerce companies in major cyber attack: Reports Altahrea Team |
2022-07-26
⋅
CYBER GEEKS All Things Infosec
⋅
HOW to Analyze Linux Malware - A Case Study of Symbiote Symbiote |
2022-07-26
⋅
Cyber Geeks
⋅
How To Analyze Linux Malware – A Case Study Of Symbiote Symbiote |