Click here to download all references as Bib-File.•
2022-01-05
⋅
Check Point
⋅
Can You Trust a File’s Digital Signature? New Zloader Campaign exploits Microsoft’s Signature Verification putting users at risk Zloader |
2022-01-05
⋅
ARMOR
⋅
Threat Intelligence Report: The Evolution of Doppel Spider from BitPaymer to Grief Ransomware DoppelPaymer FriedEx |
2022-01-05
⋅
SYGNIA
⋅
Elephant Beetle: Uncovering an Organized Financial-Theft Operation FIN13 |
2022-01-04
⋅
SYGNIA
⋅
TG2003: Elephant Beetle - Uncovering an Organized Financial-theft Operation FIN13 |
2022-01-04
⋅
forensicitguy
⋅
Extracting Indicators from a Packed Mirai Sample Mirai |
2022-01-03
⋅
Cluster25
⋅
North Korean Group “KONNI” Targets The Russian Diplomatic Sector With New Versions Of Malware Implants Konni |
2022-01-03
⋅
MinervaLabs
⋅
Malicious Telegram Installer Drops Purple Fox Rootkit PurpleFox |
2022-01-02
⋅
Atomic Matryoshka
⋅
"Cracking Open the Malware Piñata" Series: Intro to Dynamic Analysis with RedLineStealer RedLine Stealer |
2022-01-02
⋅
Medium amgedwageh
⋅
Automating The Analysis Of An AutoIT Script That Wraps A Remcos RAT Remcos |
2022-01-01
⋅
aspirets
⋅
Bumblebee Malware Loader: Threat Analysis BumbleBee |
2022-01-01
⋅
Brute Ratel brute_ratel |
2022-01-01
⋅
Triskele Labs
⋅
Investigating a Monero Coin Miner Coinminer |
2022-01-01
⋅
Silent Push
⋅
Lapsus$ Group (DEV-0537/UNC3661) - an emerging dark net threat actor leveraging insider threats-or was it? |
2022-01-01
⋅
Silent Push
⋅
Log4shell: a threat intelligence perspective |
2022-01-01
⋅
Silent Push
⋅
The Manipulaters Team Blog Post |
2022-01-01
⋅
Toli Security
⋅
Active crypto-mining operation by TeamTNT TeamTNT |
2021-12-31
⋅
victory medium
⋅
Compromised Godaddy Infrastructure Attacking Numerous U.S. Government Websites to Promote “Canadian Pharmacy” Scam Websites |
2021-12-31
⋅
⋅
CERT.PL
⋅
IKO activation - Malware campaign Coper |
2021-12-30
⋅
Cloudsek
⋅
Technical Analysis of Khonsari Ransomware Campaign Exploiting the Log4Shell Vulnerability Khonsari |
2021-12-30
⋅
InfoSec Handlers Diary Blog
⋅
Agent Tesla Updates SMTP Data Exfiltration Technique Agent Tesla |