Click here to download all references as Bib-File.•
2022-03-23
⋅
Trustwave
⋅
Trustwave’s Action Response: The Lapsus$ Hacker Group Shows Us the Importance of Securing the Digital Supply Chain |
2022-03-23
⋅
vmware
⋅
SysJoker – An Analysis of a Multi-OS RAT SysJoker SysJoker SysJoker |
2022-03-23
⋅
The Hacker News
⋅
abuse mikrotik router by GLUPTEBA malware Glupteba Proxy Glupteba |
2022-03-23
⋅
PythonBytes
⋅
Tracking cyber intruders with Jupyter and Python |
2022-03-23
⋅
Mandiant
⋅
Not So Lazarus: Mapping DPRK Cyber Threat Groups to Government Organizations |
2022-03-23
⋅
Secureworks
⋅
GOLD ULRICK Leaks Reveal Organizational Structure and Relationships Conti Emotet IcedID TrickBot |
2022-03-23
⋅
Secureworks
⋅
Threat Intelligence Executive Report Volume 2022, Number 2 Conti Emotet IcedID TrickBot |
2022-03-23
⋅
splunk
⋅
Gone in 52 Seconds…and 42 Minutes: A Comparative Analysis of Ransomware Encryption Speed Avaddon Babuk BlackMatter Conti DarkSide LockBit Maze Mespinoza REvil Ryuk |
2022-03-23
⋅
CrowdStrike
⋅
Falcon OverWatch Threat Hunting Contributes to Seamless Protection Against Novel BlackCat Attack BlackCat |
2022-03-23
⋅
Team Cymru
⋅
Raccoon Stealer – An Insight into Victim “Gates” Raccoon |
2022-03-23
⋅
BleepingComputer
⋅
New Mustang Panda hacking campaign targets diplomats, ISPs PlugX |
2022-03-23
⋅
⋅
Qianxin
⋅
Analysis of Attack Activity of PROMETHIUM Disguised StrongPity |
2022-03-23
⋅
InfoSec Handlers Diary Blog
⋅
Arkei Variants: From Vidar to Mars Stealer Arkei Stealer Mars Stealer Vidar |
2022-03-23
⋅
ESET Research
⋅
Mustang Panda’s Hodur: Old tricks, new Korplug variant Hodur PlugX |
2022-03-23
⋅
MSSPAlert
⋅
LokiLocker Ransomware May Use False Flag to Avoid Identification LokiLocker |
2022-03-23
⋅
KrebsOnSecurity
⋅
A Closer Look at the LAPSUS$ Data Extortion Group RedLine Stealer |
2022-03-23
⋅
NVISO Labs
⋅
Hunting Emotet campaigns with Kusto Emotet |
2022-03-22
⋅
Rewterz Information Security
⋅
Russian-Ukrainian Cyber Warfare – Rewterz Threat Intelligence Rollup NB65 |
2022-03-22
⋅
Trustwave
⋅
Dissecting a Phishing Campaign with a Captcha-based URL |
2022-03-22
⋅
⋅
360 Threat Intelligence Center
⋅
Quantum Attack System – NSA "APT-C-40" Hacking Organization High-end Cyber Attack Weapon Technical Analysis Report (I) |