Click here to download all references as Bib-File.•
2022-02-24
⋅
Alert (AA22-055A) Iranian Government-Sponsored Actors Conduct Cyber Operations Against Global Government and Commercial Networks POWERSTATS PowGoop MoriAgent |
2022-02-23
⋅
The Shadowserver Foundation
⋅
Shadowserver Special Reports – Cyclops Blink CyclopsBlink |
2022-02-23
⋅
Sekoia
⋅
Banana Sulfate infrastructure cluster exposed |
2022-02-23
⋅
splunk
⋅
An Empirically Comparative Analysis of Ransomware Binaries Avaddon Babuk BlackMatter Conti DarkSide LockBit Maze Mespinoza REvil Ryuk |
2022-02-23
⋅
cyber.wtf blog
⋅
What the Pack(er)? Cobalt Strike Emotet |
2022-02-23
⋅
Fortinet
⋅
Global Threat Landscape Report A Semiannual Report by FortiGuard Labs |
2022-02-23
⋅
CrowdStrike
⋅
Access Brokers: Who Are the Targets, and What Are They Worth? |
2022-02-23
⋅
ISTARI
⋅
Re-cap: The Untold Story of NotPetya, The Most Devastating Cyberattack in History EternalPetya |
2022-02-23
⋅
⋅
Weixin
⋅
APT-C-58 (Gorgon Group) attack warning Agent Tesla |
2022-02-23
⋅
The Hacker News
⋅
New Wiper Malware Targeting Ukraine Amid Russia's Military Operation HermeticWiper |
2022-02-23
⋅
SophosLabs Uncut
⋅
Dridex bots deliver Entropy ransomware in recent attacks Cobalt Strike Dridex Entropy |
2022-02-23
⋅
Twitter (@threatintel)
⋅
Tweet on new wiper malware being used in attacks on Ukraine HermeticWiper |
2022-02-23
⋅
The Record
⋅
Second data wiper attack hits Ukraine computer networks HermeticWiper WhisperGate |
2022-02-23
⋅
The Hacker News
⋅
Chinese Experts Uncover Details of Equation Group's Bvp47 Covert Hacking Tool Bvp47 |
2022-02-23
⋅
Sentinel LABS
⋅
HermeticWiper | New Destructive Malware Used In Cyber Attacks on Ukraine HermeticWiper |
2022-02-23
⋅
Pangu Lab
⋅
The Bvp47 - a Top-tier Backdoor of US NSA Equation Group Bvp47 |
2022-02-23
⋅
Sophos
⋅
Dridex bots deliver Entropy ransomware in recent attacks Entropy |
2022-02-23
⋅
AdvIntel
⋅
24 Hours From Log4Shell to Local Admin: Deep-Dive Into Conti Gang Attack on Fortune 500 (DFIR) Cobalt Strike Conti |
2022-02-22
⋅
eSentire
⋅
IcedID to Cobalt Strike In Under 20 Minutes Cobalt Strike IcedID PhotoLoader |
2022-02-22
⋅
USENIX
⋅
How Machine Learning Is Solving the Binary Function Similarity Problem |