Click here to download all references as Bib-File.•
2022-07-12
⋅
Team Cymru
⋅
An Analysis of Infrastructure linked to the Hagga Threat Actor Agent Tesla |
2022-07-08
⋅
Sekoia
⋅
Vice Society: a discreet but steady double extortion ransomware group HelloKitty |
2022-07-07
⋅
Cybereason
⋅
THREAT ANALYSIS REPORT: LockBit 2.0 - All Paths Lead to Ransom LockBit |
2022-07-05
⋅
When Pentest Tools Go Brutal: Red-Teaming Tool Being Abused by Malicious Actors Brute Ratel C4 |
2022-07-05
⋅
SECUINFRA
⋅
Whatever floats your Boat – Bitter APT continues to target Bangladesh AlmondRAT Artra Downloader Bitter RAT ZxxZ |
2022-07-05
⋅
Palo Alto Networks Unit 42
⋅
When Pentest Tools Go Brutal: Red-Teaming Tool Being Abused by Malicious Actors |
2022-06-30
⋅
Microsoft
⋅
Using process creation properties to catch evasion techniques |
2022-06-30
⋅
Blackberry
⋅
Threat Thursday: China-Based APT Plays Auto-Updater Card to Deliver WinDealer Malware WinDealer Red Nue |
2022-06-30
⋅
Microsoft
⋅
Toll fraud malware: How an Android application can drain your wallet Joker |
2022-06-29
⋅
Team Cymru
⋅
The Sliding Scale of Threat Actor Sophistication When Reacting to 0-day Vulnerabilities |
2022-06-29
⋅
Sekoia
⋅
Raccoon Stealer v2 – Part 2: In-depth analysis Raccoon |
2022-06-28
⋅
Symantec
⋅
Bumblebee: New Loader Rapidly Assuming Central Position in Cyber-crime Ecosystem BumbleBee |
2022-06-28
⋅
Sekoia
⋅
Raccoon Stealer v2 – Part 1: The return of the dead Raccoon |
2022-06-27
⋅
CyberArk
⋅
Inside Matanbuchus: A Quirky Loader Matanbuchus |
2022-06-27
⋅
Blackberry
⋅
Threat Spotlight: Eternity Project MaaS Goes On and On Eternity Stealer |
2022-06-23
⋅
Secureworks
⋅
BRONZE STARLIGHT Ransomware Operations Use HUI Loader ATOMSILO Cobalt Strike HUI Loader LockFile NightSky Pandora PlugX Quasar RAT Rook SodaMaster BRONZE STARLIGHT |
2022-06-23
⋅
splunk
⋅
Threat Update: Industroyer2 INDUSTROYER2 |
2022-06-21
⋅
Malwarebytes Labs
⋅
Russia’s APT28 uses fear of nuclear war to spread Follina docs in Ukraine |
2022-06-16
⋅
Blackberry
⋅
Threat Thursday: Unique Delivery Method for Snake Keylogger 404 Keylogger |
2022-06-15
⋅
AttackIQ
⋅
Attack Graph Emulating the Conti Ransomware Team’s Behaviors BazarBackdoor Conti TrickBot |