Click here to download all references as Bib-File.•
2022-09-14
⋅
CISA
⋅
Alert (AA22-257A): Iranian Islamic Revolutionary Guard Corps-Affiliated Cyber Actors Exploiting Vulnerabilities for Data Extortion and Disk Encryption for Ransom Operations |
2022-09-14
⋅
Cybereason
⋅
THREAT ANALYSIS REPORT: Abusing Notepad++ Plugins for Evasion and Persistence Meterpreter |
2022-09-13
⋅
DataBreaches.net
⋅
Singapore corporations making progress in preventing cyberattacks ALTDOS |
2022-09-08
⋅
Mandiant
⋅
What to Expect When You’re Electing: Preparing for Cyber Threats to the 2022 U.S. Midterm Elections |
2022-09-08
⋅
Certfa
⋅
Charming Kitten: "Can We Have A Meeting?" Important puzzle pieces of Charming Kitten's cyber espionage operations |
2022-09-08
⋅
Cybereason
⋅
Threat Analysis Report: PlugX RAT Loader Evolution PlugX |
2022-09-08
⋅
Center for European Policy Analysis
⋅
Russian Cyberwarfare: Unpacking the Kremlin’s Capabilities |
2022-08-30
⋅
CYBER GEEKS All Things Infosec
⋅
ChromeLoader Browser Hijacker Choziosi |
2022-08-29
⋅
CYBER GEEKS All Things Infosec
⋅
A Technical Analysis of Pegasus for Android – Part 1 Chrysaor |
2022-08-22
⋅
Medium (Katie’s Five Cents)
⋅
A Cyber Threat Intelligence Self-Study Plan: Part 2 |
2022-08-19
⋅
Resecurity
⋅
Cybercriminals Are Targeting Law Enforcement Agencies Worldwide |
2022-08-19
⋅
Cybereason
⋅
THREAT ALERT: Inside the Redeemer 2.0 Ransomware |
2022-08-18
⋅
Trustwave
⋅
Overview of the Cyber Weapons Used in the Ukraine - Russia War AcidRain CaddyWiper Cobalt Strike CredoMap DCRat DoubleZero GraphSteel GrimPlant HermeticWiper INDUSTROYER2 InvisiMole IsaacWiper PartyTicket |
2022-08-18
⋅
Trustwave
⋅
Overview of the Cyber Weapons Used in the Ukraine - Russia War AcidRain CaddyWiper Cobalt Strike CredoMap DCRat DoubleZero GraphSteel GrimPlant HermeticWiper INDUSTROYER2 InvisiMole IsaacWiper PartyTicket |
2022-08-17
⋅
Cybereason
⋅
Bumblebee Loader – The High Road to Enterprise Domain Control BumbleBee Cobalt Strike |
2022-08-11
⋅
Accenture
⋅
How cybercriminals are weaponizing leaked ransomware data for follow-up attacks |
2022-08-10
⋅
⋅
Cert-UA
⋅
Cyberattacks of the UAC-0010 group (Armageddon): malicious programs GammaLoad, GammaSteel (CERT-UA#5134) Gamaredon Group |
2022-08-10
⋅
Cisco
⋅
Cisco Talos shares insights related to recent cyber attack on Cisco Yanluowang UNC2447 |
2022-08-10
⋅
⋅
Cybersecurity Trends
⋅
“Pegasus”, the spyware for smartphones. How does it work and how can you protect yourself? Chrysaor |
2022-08-03
⋅
CyberScoop
⋅
Environmental hacktivists publish 2 terabytes of mining company emails Guacamaya |