Click here to download all references as Bib-File.•
2022-10-11
⋅
ESET Research
⋅
POLONIUM targets Israel with Creepy malware CreepySnail CreepExfil DeepCreep MegaCreep Unidentified 097 (Polonium Keylogger) |
2022-10-11
⋅
⋅
AhnLab
⋅
From Exchange Server vulnerability to ransomware infection in just 7 days LockBit MimiKatz |
2022-10-10
⋅
RiskIQ
⋅
DEV-0832 Leverages Commodity Tools in Opportunistic Ransomware Campaigns BlackCat Mount Locker SystemBC Zeppelin |
2022-10-09
⋅
DataBreaches.net
⋅
Johnson Fitness and Wellness hit by DESORDEN Group Desorden Group |
2022-10-08
⋅
Github (itaymigdal)
⋅
Nimbo-C2 - A new C2 Framework Nimbo-C2 Nimbo-C2 |
2022-10-07
⋅
Flashpoint
⋅
Analysis of CISA releases Advisory on Top CVEs Exploited Chinese State-Sponsored Groups Lilac Typhoon |
2022-10-07
⋅
Checkmarx
⋅
LofyGang – Software Supply Chain Attackers; Organized, Persistent, and Operating for Over a Year LofyGang |
2022-10-07
⋅
YouTube (BSides Portland)
⋅
SmokeLoader - The Pandora's box of Tricks SmokeLoader |
2022-10-07
⋅
Team Cymru
⋅
A Visualizza into Recent IcedID Campaigns: Reconstructing Threat Actor Metrics with Pure Signal™ Recon IcedID PhotoLoader |
2022-10-06
⋅
Aon
⋅
Amazon Web Services: Exploring The Cost Of Exfil |
2022-10-06
⋅
ThreatMon
⋅
Rhadamanthys Stealer Analysis Rhadamanthys |
2022-10-06
⋅
Trellix
⋅
Evolution of BazarCall Social Engineering Tactics BazarBackdoor BazarCall |
2022-10-06
⋅
NullMixer Drops Multiple Malware Families LgoogLoader |
2022-10-06
⋅
SOCRadar
⋅
New Spyware RatMilad Targets Middle Eastern Mobile Devices RatMilad |
2022-10-06
⋅
YouTube ( BSides Budapest IT Security Conference)
⋅
DiceyF deploys GamePlayerFramework (Video) GamePlayerFramework |
2022-10-06
⋅
Blackberry
⋅
Mustang Panda Abuses Legitimate Apps to Target Myanmar Based Victims PlugX |
2022-10-06
⋅
CISA
⋅
Alert (AA22-279A) Top CVEs Actively Exploited By People’s Republic of China State-Sponsored Cyber Actors |
2022-10-06
⋅
Twitter (@ESETresearch)
⋅
Tweet on Bumblebee being modularized like trickbot BumbleBee |
2022-10-05
⋅
Zscaler
⋅
Analysis of LilithBot Malware and Eternity Threat Group Eternity Clipper Eternity Stealer Lilith |
2022-10-05
⋅
Fortinet
⋅
Excel Document Delivers Multiple Malware by Exploiting CVE-2017-11882 – Part II Formbook RedLine Stealer |