Click here to download all references as Bib-File.•
2022-08-25
⋅
Trend Micro
⋅
New Golang Ransomware Agenda Customizes Attacks AgendaCrypt |
2022-08-25
⋅
Group-IB
⋅
Roasting 0ktapus: The phishing campaign going after Okta identity credentials |
2022-08-25
⋅
SentinelOne
⋅
BlueSky Ransomware | AD Lateral Movement, Evasion and Fast Encryption Put Threat on the Radar BlueSky Cobalt Strike JuicyPotato |
2022-08-25
⋅
splunk
⋅
AppLocker Rules as Defense Evasion: Complete Analysis Azorult |
2022-08-25
⋅
Palo Alto Networks Unit 42
⋅
Threat Assessment: Black Basta Ransomware Black Basta |
2022-08-25
⋅
Microsoft
⋅
MERCURY leveraging Log4j 2 vulnerabilities in unpatched systems to target Israeli organizations MimiKatz |
2022-08-25
⋅
muha2xmad
⋅
Technical analysis of IRATA android malware IRATA |
2022-08-25
⋅
K7 Security
⋅
BleachGap Revamped BleachGap |
2022-08-25
⋅
Kaspersky
⋅
Kimsuky’s GoldDragon cluster and its C2 operations |
2022-08-25
⋅
Github (muha2xmad)
⋅
Thread about the content of IRATA malicious APK IRATA |
2022-08-24
⋅
Virustotal Page for the sample Unidentified 108 |
2022-08-24
⋅
Trend Micro
⋅
Ransomware Actor Abuses Genshin Impact Anti-Cheat Driver to Kill Antivirus Babuk |
2022-08-24
⋅
Deep instinct
⋅
The Dark Side of Bumblebee Malware Loader BumbleBee |
2022-08-24
⋅
CrowdStrike
⋅
The Anatomy of Wiper Malware, Part 2: Third-Party Drivers |
2022-08-24
⋅
Trend Micro
⋅
Ransomware Actor Abuses Genshin Impact Anti-Cheat Driver to Kill Antivirus (IoCs) Babuk |
2022-08-24
⋅
Trend Micro
⋅
Looking into the Void - Targeting Bulletproof Hosts to Block Attacks Early in the Kill Chain |
2022-08-24
⋅
Elastic
⋅
QBOT Malware Analysis QakBot |
2022-08-24
⋅
Microsoft
⋅
Looking for the ‘Sliver’ lining: Hunting for emerging command-and-control frameworks BumbleBee Sliver |
2022-08-24
⋅
Github (rad9800)
⋅
Malware Madness: EXCEPTION edition Dridex |
2022-08-24
⋅
Microsoft
⋅
MagicWeb: NOBELIUM’s post-compromise trick to authenticate as anyone |