Click here to download all references as Bib-File.•
2022-09-12
⋅
The DFIR Report
⋅
Dead or Alive? An Emotet Story Cobalt Strike Emotet |
2022-09-11
⋅
Github (0xTriboulet)
⋅
Github Repository for Revenant Revenant |
2022-09-11
⋅
Github (HavocFramework)
⋅
Havoc Havoc |
2022-09-10
⋅
Malware development: persistence - part 10. Using Image File Execution Options. Simple C++ example. SUNBURST |
2022-09-10
⋅
⋅
Malverse
⋅
Realizziamo un C&C Server in Python (Bankshot) Bankshot |
2022-09-09
⋅
Github (m4now4r)
⋅
“Mustang Panda” – Enemy at the gate PlugX |
2022-09-09
⋅
Elastic
⋅
BUGHATCH Malware Analysis BUGHATCH |
2022-09-09
⋅
Cofense
⋅
Lampion Trojan Utilizes New Delivery through Cloud-Based Sharing lampion |
2022-09-08
⋅
Cisco Talos
⋅
Lazarus and the tale of three RATs MagicRAT MimiKatz VSingle YamaBot |
2022-09-08
⋅
Trend Micro
⋅
How Malicious Actors Abuse Native Linux Tools in Attacks |
2022-09-08
⋅
Mandiant
⋅
What to Expect When You’re Electing: Preparing for Cyber Threats to the 2022 U.S. Midterm Elections |
2022-09-08
⋅
Microsoft
⋅
Microsoft investigates Iranian attacks against the Albanian government ZeroCleare |
2022-09-08
⋅
Microsoft
⋅
The art and science behind Microsoft threat hunting: Part 1 |
2022-09-08
⋅
Certfa
⋅
Charming Kitten: "Can We Have A Meeting?" Important puzzle pieces of Charming Kitten's cyber espionage operations |
2022-09-08
⋅
Secureworks
⋅
BRONZE PRESIDENT Targets Government Officials PlugX |
2022-09-08
⋅
Cybereason
⋅
Threat Analysis Report: PlugX RAT Loader Evolution PlugX |
2022-09-08
⋅
Sentinel LABS
⋅
Crimeware Trends | Ransomware Developers Turn to Intermittent Encryption to Evade Detection AgendaCrypt Black Basta BlackCat PLAY |
2022-09-08
⋅
Center for European Policy Analysis
⋅
Russian Cyberwarfare: Unpacking the Kremlin’s Capabilities |
2022-09-07
⋅
Intel 471
⋅
Conti vs. Monti: A Reinvention or Just a Simple Rebranding? Conti |
2022-09-07
⋅
Cisco Talos
⋅
MagicRAT: Lazarus’ latest gateway into victim networks MagicRAT Tiger RAT |