Click here to download all references as Bib-File.•
2021-06-02
⋅
Bleeping Computer
⋅
FBI: REvil cybergang behind the JBS ransomware attack REvil |
2021-06-02
⋅
Check Point Research
⋅
SharpPanda: Chinese APT Group Targets Southeast Asian Government With Previously Unknown Backdoor SharpPanda |
2021-06-01
⋅
Cisco
⋅
Backdoors, RATs, Loaders evasion techniques BazarNimrod GoldMax Oblique RAT |
2021-06-01
⋅
Microsoft
⋅
New sophisticated email-based attack from NOBELIUM Cobalt Strike |
2021-06-01
⋅
⋅
Rising Threat Intelligence Center
⋅
Rising warning: APT organizes Lazarus Group to launch an attack on China |
2021-06-01
⋅
CyberScoop
⋅
Ex-US ambassador, anti-corruption activists in Ukraine were targets of suspected Russian phishing |
2021-06-01
⋅
SentinelOne
⋅
NobleBaron | New Poisoned Installers Could Be Used In Supply Chain Attacks Cobalt Strike |
2021-06-01
⋅
Malwarebytes
⋅
Kimsuky APT continues to target South Korean government using AppleSeed backdoor Appleseed |
2021-06-01
⋅
Medium mergene
⋅
Detecting Initial Access: HTML Smuggling and ISO Images — Part 2 |
2021-06-01
⋅
Medium mergene
⋅
Detecting Initial Access: HTML Smuggling and ISO Images — Part 1 |
2021-06-01
⋅
Bitdefender
⋅
Threat Actors Use Mockups of Popular Apps to Spread Teabot and Flubot Malware on Android Anatsa FluBot |
2021-06-01
⋅
wordfence
⋅
Critical 0-day in Fancy Product Designer Under Active Attack |
2021-06-01
⋅
Bleeping Computer
⋅
Critical WordPress plugin zero-day under active exploitation |
2021-05-31
⋅
Wired
⋅
Hacker Lexicon: What Is a Supply Chain Attack? EternalPetya SUNBURST |
2021-05-31
⋅
DataBreaches.net
⋅
Babuk re-organizes as Payload Bin, offers its first leak Babuk HelloKitty |
2021-05-29
⋅
Twitter (@elisalem9)
⋅
Tweet on obfuscation mechanism and extraction procedure of COBALTSTRIKE beacon module used by NOBELIUM/UNC2452 Cobalt Strike |
2021-05-28
⋅
CISA
⋅
Malware Analysis Report (AR21-148A): Cobalt Strike Beacon Cobalt Strike |
2021-05-28
⋅
Twitter (@Jacob_Pimental)
⋅
Tweet on REvil ver 2.07 REvil |
2021-05-28
⋅
Trend Micro
⋅
DarkSide on Linux: Virtual Machines Targeted DarkSide |
2021-05-27
⋅
xorhex blog
⋅
Mustang Panda PlugX - Reused Mutex and Folder Found in the Extracted Config PlugX |