Click here to download all references as Bib-File.•
| 2022-10-05
            
            ⋅
            
            Microsoft
            ⋅ Detecting and preventing LSASS credential dumping attacks | 
| 2022-10-04
            
            ⋅
            
            Rewterz Information Security
            ⋅ Rewterz Threat Alert – KONNI APT Group – Active IOCs Konni Opal Sleet | 
| 2022-10-04
            
            ⋅
            
            Rewterz Information Security
            ⋅ Witchetty APT Group Witchetty | 
| 2022-10-01
            
            ⋅
            
            Yahoo Finance
            ⋅ Analysis-Mexico data hack exposes government cybersecurity vulnerability Guacamaya | 
| 2022-09-30
            
            ⋅
            
            Microsoft
            ⋅ Analyzing attacks using the Exchange vulnerabilities CVE-2022-41040 and CVE-2022-41082 | 
| 2022-09-29
            
            ⋅
            
            Microsoft
            ⋅ ZINC weaponizing open-source software BLINDINGCAN CLOUDBURST miniBlindingCan | 
| 2022-09-29
            
            ⋅
            
            NTT
            ⋅ Report on APT Attacks by BlackTech Bifrost PLEAD TSCookie Flagpro Gh0stTimes SelfMake Loader SPIDERPIG RAT | 
| 2022-09-29
            
            ⋅
            
            
            ⋅
            
            GTSC
            ⋅ Warning Campaign Attack Using Zero Day Vulnerability on Microsoft Exchange Server | 
| 2022-09-28
            
            ⋅
            
            Securonix
            ⋅ Securonix Threat Labs Security Advisory: Detecting STEEP#MAVERICK: New Covert Attack Campaign Targeting Military Contractors | 
| 2022-09-27
            
            ⋅
            
            SecurityScorecard
            ⋅ A Deep Dive Into the APT28’s stealer called CredoMap CredoMap | 
| 2022-09-26
            
            ⋅
            
            K7 Security
            ⋅ DcDcrypt Ransomware Decryptor DcDcrypt | 
| 2022-09-23
            
            ⋅
            
            humansecurity
            ⋅ Poseidon’s Offspring: Charybdis and Scylla | 
| 2022-09-21
            
            ⋅
            
            Microsoft
            ⋅ The art and science behind Microsoft threat hunting: Part 2 | 
| 2022-09-18
            
            ⋅
            
            K7 Security
            ⋅ Raccoon back with new claws! Raccoon | 
| 2022-09-15
            
            ⋅
            
            IT Security Guru
            ⋅ Documents For Sale on the Dark Web Adrastea | 
| 2022-09-14
            
            ⋅
            
            CISA
            ⋅ Alert (AA22-257A): Iranian Islamic Revolutionary Guard Corps-Affiliated Cyber Actors Exploiting Vulnerabilities for Data Extortion and Disk Encryption for Ransom Operations | 
| 2022-09-14
            
            ⋅
            
            Security Joes
            ⋅ Dissecting PlugX to Extract Its Crown Jewels PlugX | 
| 2022-09-14
            
            ⋅
            
            SecurityScorecard
            ⋅ A Detailed Analysis of the Quantum Ransomware Mount Locker | 
| 2022-09-12
            
            ⋅
            
            Trend Micro
            ⋅ Security Breaks: TeamTNT’s DockerHub Credentials Leak | 
| 2022-09-08
            
            ⋅
            
            Microsoft
            ⋅ Microsoft investigates Iranian attacks against the Albanian government ZeroCleare |