Click here to download all references as Bib-File.•
2022-07-21
⋅
Censys
⋅
Russian Ransomware C2 Network Discovered in Censys Data DeimosC2 PoshC2 |
2022-07-21
⋅
Blackberry
⋅
The 13 Deadly Sins of APT Incident Response — Part 1 |
2022-07-21
⋅
AhnLab
⋅
Amadey Bot Being Distributed Through SmokeLoader Amadey SmokeLoader |
2022-07-21
⋅
Malware development tricks. Run shellcode like a Lazarus Group. C++ example. |
2022-07-21
⋅
Silentpush
⋅
It’s time to close the door on open directories |
2022-07-21
⋅
Avast Decoded
⋅
The Return of Candiru: Zero-days in the Middle East Caramel Tsunami |
2022-07-21
⋅
Talos
⋅
Attackers target Ukraine using GoMet backdoor GoMet |
2022-07-21
⋅
⋅
Cert-AgID
⋅
Tecniche per semplificare l’analisi del malware GuLoader CloudEyE |
2022-07-21
⋅
Intezer
⋅
Lightning Framework: New Undetected “Swiss Army Knife” Linux Malware Lightning Framework |
2022-07-21
⋅
Proofpoint
⋅
Buy, Sell, Steal, EvilNum Targets Cryptocurrency, Forex, Commodities EVILNUM Evilnum |
2022-07-21
⋅
Trend Micro
⋅
Alibaba OSS Buckets Compromised to Distribute Malicious Shell Scripts via Steganography |
2022-07-21
⋅
Sentinel LABS
⋅
LockBit 3.0 Update | Unpicking the Ransomware’s Latest Anti-Analysis and Evasion Techniques LockBit |
2022-07-21
⋅
⋅
ASEC
⋅
Dissemination of AppleSeed to Specific Military Maintenance Companies Appleseed |
2022-07-21
⋅
ASEC
⋅
Malware Being Distributed by Disguising Itself as Icon of V3 Lite Ave Maria |
2022-07-20
⋅
Securonix Threat Labs
⋅
STIFF#BIZON Detection Using Securonix – New Attack Campaign Observed Possibly Linked to Konni/APT37 (North Korea) - Securonix Konni Opal Sleet |
2022-07-20
⋅
Sophos
⋅
OODA: X-Ops Takes On Burgeoning SQL Server Attacks Maoloa Remcos TargetCompany |
2022-07-20
⋅
Freebuf
⋅
Abused Slack Service: Analysis of APT29's Attack on Italy Unidentified 098 (APT29 Slack Downloader) |
2022-07-20
⋅
⋅
Qianxin
⋅
The Sidewinder (APT-Q-39) uses Google Play to spread an analysis of malicious Android software SideWinder |
2022-07-20
⋅
Malwarebytes
⋅
Google Ads Lead to Major Malvertising Campaign |
2022-07-20
⋅
Trend Micro
⋅
Analyzing Penetration-Testing Tools That Threat Actors Use to Breach Systems and Steal Data |