Click here to download all references as Bib-File.•
2021-04-29
⋅
Maltego
⋅
Investigating TA413 Threat Actor Group Using OpenCTI in Maltego |
2021-04-29
⋅
The Record
⋅
QNAP warns of AgeLocker ransomware attacks against NAS devices AgeLocker |
2021-04-28
⋅
Bitdefender
⋅
New Nebulae Backdoor Linked with the NAIKON Group Aria-body Nebulae |
2021-04-28
⋅
BleepingComputer
⋅
Cyberspies target military organizations with new Nebulae backdoor Nebulae |
2021-04-28
⋅
Trend Micro
⋅
Water Pamola Attacked Online Shops Via Malicious Orders (APPENDIX) |
2021-04-28
⋅
Trend Micro
⋅
Water Pamola Attacked Online Shops Via Malicious Orders Ghost RAT |
2021-04-28
⋅
360 netlab
⋅
RotaJakiro: A long live secret backdoor with 0 VT detection RotaJakiro |
2021-04-28
⋅
FireEye
⋅
Ghostwriter Update: Cyber Espionage Group UNC1151 Likely Conducts Ghostwriter Influence Activity |
2021-04-28
⋅
Reversing Labs
⋅
Spotting malicious Excel4 macros QakBot |
2021-04-28
⋅
⋅
La Repubblica
⋅
Un sospetto attacco telematico blocca le filiali della Bcc di Roma DarkSide |
2021-04-27
⋅
CrowdStrike
⋅
Ransomware Preparedness: A Call to Action Dharma GlobeImposter Maze Phobos CIRCUS SPIDER TRAVELING SPIDER |
2021-04-27
⋅
The Record
⋅
How law enforcement can stay a step ahead of hackers |
2021-04-27
⋅
Medium Cedric Owens
⋅
macOS Gatekeeper Bypass (2021 Edition) Shlayer |
2021-04-26
⋅
The Record
⋅
Despite arrests in Spain, FluBot operations explode across Europe and Japan FluBot |
2021-04-26
⋅
CoveWare
⋅
Ransomware Attack Vectors Shift as New Software Vulnerability Exploits Abound Avaddon Clop Conti DarkSide Egregor LockBit Mailto Phobos REvil Ryuk SunCrypt |
2021-04-26
⋅
Juniper
⋅
Linux Servers Hijacked to Implant SSH Backdoor |
2021-04-26
⋅
Dragos
⋅
New ICS Threat Activity Group: TALONITE FlowCloud Lookback |
2021-04-26
⋅
Jamf Blog
⋅
Shlayer malware abusing Gatekeeper bypass on macOS Shlayer |
2021-04-26
⋅
Objective-See
⋅
All Your Macs Are Belong To Us: bypassing macOS's file quarantine, gatekeeper, and notarization requirements Shlayer |
2021-04-26
⋅
CISA
⋅
Russian Foreign Intelligence Service (SVR)Cyber Operations: Trends and Best Practices for Network Defenders elf.wellmess WellMess |