Click here to download all references as Bib-File.•
2022-06-01
⋅
CISA
⋅
Joint Cybersecurity Advisory (Product ID AA22-152A): Karakurt Data Extortion Group MimiKatz |
2022-05-27
⋅
⋅
PTSecurity
⋅
How bootkits are implemented in modern firmware and how UEFI differs from Legacy BIOS LoJax MoonBounce |
2022-05-26
⋅
AT&T Cybersecurity
⋅
Rapidly evolving IoT malware EnemyBot now targeting Content Management System servers and Android devices EnemyBot |
2022-05-24
⋅
GBHackers on Security
⋅
Twisted Panda: Chinese APT Launch Spy Operation Against Russian Defence Institutes |
2022-05-20
⋅
SANS ISC
⋅
A 'Zip Bomb' to Bypass Security Controls & Sandboxes BitRAT |
2022-05-18
⋅
K7 Security
⋅
Steer Clear of Instant Loan Apps |
2022-05-18
⋅
Cado Security
⋅
Linux Attack Techniques: Dynamic Linker Hijacking with LD Preload |
2022-05-17
⋅
Microsoft Security
⋅
In hot pursuit of ‘cryware’: Defending hot wallets from attacks Mars Stealer RedLine Stealer |
2022-05-13
⋅
K7 Security
⋅
Teabot Anatsa |
2022-05-11
⋅
NTT Security Holdings
⋅
Analysis of an Iranian APTs “E400” PowGoop Variant Reveals Dozens of Control Servers Dating Back to 2020 PowGoop |
2022-05-11
⋅
K7 Security
⋅
Transparent Tribe Targets Educational Institution Crimson RAT |
2022-05-11
⋅
HP
⋅
Threat Insights Report Q1 - 2022 AsyncRAT Emotet Mekotio Vjw0rm |
2022-05-11
⋅
Sandfly Security
⋅
BPFDoor - An Evasive Linux Backdoor Technical Analysis BPFDoor |
2022-05-09
⋅
XenArmor
⋅
XenArmor | Windows Security & Password Recovery Software XenArmor |
2022-05-09
⋅
Microsoft Security
⋅
Ransomware-as-a-service: Understanding the cybercrime gig economy and how to protect yourself Griffon BazarBackdoor BlackCat BlackMatter Blister Gozi LockBit Pandora Rook SystemBC TrickBot |
2022-05-06
⋅
Twitter (@MsftSecIntel)
⋅
Twitter Thread on initial infeciton of SocGholish/ FAKEUPDATES campaigns lead to BLISTER Loader, CobaltStrike, Lockbit and followed by Hands On Keyboard activity FAKEUPDATES Blister Cobalt Strike LockBit |
2022-05-02
⋅
Sentinel LABS
⋅
Moshen Dragon’s Triad-and-Error Approach | Abusing Security Software to Sideload PlugX and ShadowPad PlugX ShadowPad Moshen Dragon |
2022-04-29
⋅
Team Cymru
⋅
Sliver Case Study: Assessing Common Offensive Security Tools The Use of the Sliver C2 Framework for Malicious Purposes Sliver |
2022-04-29
⋅
The Record
⋅
German wind farm operator confirms cybersecurity incident Black Basta BlackCat |
2022-04-27
⋅
Microsoft
⋅
Special Report: Ukraine An overview of Russia’s cyberattack activity in Ukraine CaddyWiper DoubleZero HermeticWiper INDUSTROYER2 IsaacWiper PartyTicket WhisperGate |