Click here to download all references as Bib-File.•
2022-02-18
⋅
Huntress Labs
⋅
Hackers No Hashing: Randomizing API Hashes to Evade Cobalt Strike Shellcode Detection Cobalt Strike |
2022-02-18
⋅
Kookmin University
⋅
A Method for Decrypting Data Infected with Hive Ransomware Hive Hive |
2022-02-18
⋅
The Record
⋅
Academics publish method for recovering data encrypted by the Hive ransomware Hive Hive |
2022-02-18
⋅
Bleeping Computer
⋅
Conti ransomware gang takes over TrickBot malware operation Conti TrickBot |
2022-02-18
⋅
YouTube (John Hammond)
⋅
Uncovering NETWIRE Malware - Discovery & Deobfuscation NetWire RC |
2022-02-18
⋅
SANS ISC
⋅
Remcos RAT Delivered Through Double Compressed Archive Remcos |
2022-02-17
⋅
SinaCyber
⋅
Testimony before the U.S.-China Economic and Security Review Commission Hearing on “China’s Cyber Capabilities: Warfare, Espionage, and Implications for the United States” PlugX APT26 APT41 |
2022-02-17
⋅
Zscaler
⋅
FreeCryptoScam - A New Cryptocurrency Scam That Leads to Installation of Backdoors and Stealers DCRat |
2022-02-17
⋅
Trellix
⋅
Looking over the nation-state actors’ shoulders: Even they have a difficult day sometimes Empire Downloader |
2022-02-17
⋅
Blackberry
⋅
Threat Thursday: Arkei Infostealer Expands Reach Using SmokeLoader to Target Crypto Wallets and MFA Arkei Stealer SmokeLoader |
2022-02-17
⋅
NCC Group
⋅
Detecting Karakurt – an extortion focused threat actor |
2022-02-17
⋅
SentinelOne
⋅
Log4j2 In The Wild | Iranian-Aligned Threat Actor “TunnelVision” Actively Exploiting VMware Horizon APT35 |
2022-02-17
⋅
Cofense
⋅
Phishers Spoof Power BI to Visualize Your Credential Data |
2022-02-17
⋅
Medium s2wlab
⋅
Tracking SugarLocker ransomware & operator Sugar |
2022-02-17
⋅
⋅
Github (shhoya)
⋅
VMProtect Analysis 1.0: VMP Mutation Fix |
2022-02-16
⋅
Trend Micro
⋅
SMS PVA Services' Use of Infected Android Phones Reveals Flaws in SMS Verification Guerrilla |
2022-02-16
⋅
Välisluureamet Estonian Foreign Intelligence Service
⋅
International Security and Estonia 2022 |
2022-02-16
⋅
CrowdStrike
⋅
Global Threat Report 2022 Sea Turtle |
2022-02-16
⋅
The Record
⋅
Red Cross blames hack on Zoho vulnerability, suspects APT attack |
2022-02-16
⋅
CISA
⋅
Alert (AA22-047A) Russian State-Sponsored Cyber Actors Target Cleared Defense Contractor Networks to Obtain Sensitive U.S. Defense Information and Technology |