Click here to download all references as Bib-File.
2022-04-11 ⋅ Qianxin Threat Intelligence Center ⋅ Snow Abuse: Analysis of the Suspected Lazarus Attack Activities against South Korean Companies |
2022-04-05 ⋅ eSentire ⋅ eSentire Threat Intelligence Malware Analysis: DoubleZero DoubleZero |
2022-04-05 ⋅ eSentire ⋅ eSentire Threat Intelligence Malware Analysis: HeaderTip HeaderTip |
2022-04-02 ⋅ institute for advanced threats ⋅ WAVES LURKING IN THE CALM OF THE WIND AND WAVES: A DYNAMIC ANALYSIS OF THE ATTACK ACTIVITIES OF THE APT-C-00 (SEALOTUS) ORGANIZATION |
2022-03-31 ⋅ eSentire ⋅ eSentire Threat Intelligence Malware Analysis: CaddyWiper CaddyWiper |
2022-03-28 ⋅ Avast ⋅ Avast Finds Compromised Philippine Navy Certificate Used in Remote Access Tool Unidentified 091 |
2022-03-23 ⋅ Secureworks ⋅ Threat Intelligence Executive Report Volume 2022, Number 2 Conti Emotet IcedID TrickBot |
2022-03-22 ⋅ Microsoft ⋅ DEV-0537 (LAPSUS$/UNC3661) criminal actor targeting organizations for data exfiltration and destruction RedLine Stealer LAPSUS |
2022-03-21 ⋅ eSentire ⋅ eSentire Threat Intelligence Malware Analysis: HermeticWiper & PartyTicket HermeticWiper PartyTicket |
2022-03-18 ⋅ Malwarebytes ⋅ Double header: IsaacWiper and CaddyWiper CaddyWiper IsaacWiper |
2022-03-17 ⋅ Sophos ⋅ The Ransomware Threat Intelligence Center ATOMSILO Avaddon AvosLocker BlackKingdom Ransomware BlackMatter Conti Cring DarkSide dearcry Dharma Egregor Entropy Epsilon Red Gandcrab Karma LockBit LockFile Mailto Maze Nefilim RagnarLocker Ragnarok REvil RobinHood Ryuk SamSam Snatch WannaCryptor WastedLocker |
2022-03-16 ⋅ Microsoft ⋅ Uncovering Trickbot’s use of IoT devices in command-and-control infrastructure TrickBot |
2022-03-04 ⋅ Malwarebytes ⋅ HermeticWiper: A detailed analysis of the destructive malware that targeted Ukraine HermeticWiper |
2022-02-23 ⋅ Weixin ⋅ APT-C-58 (Gorgon Group) attack warning Agent Tesla |
2022-02-23 ⋅ Twitter (@threatintel) ⋅ Tweet on new wiper malware being used in attacks on Ukraine HermeticWiper |
2022-02-04 ⋅ Microsoft ⋅ ACTINIUM targets Ukrainian organizations Pteranodon Gamaredon Group |
2022-02-02 ⋅ Microsoft ⋅ The evolution of a Mac trojan: UpdateAgent’s progression UpdateAgent |
2022-02 ⋅ Google ⋅ Threat Horizons Cloud Threat Intelligence February 2022. Issue 2 |
2022-01-25 ⋅ Blueliv ⋅ Cyber Threat Intelligence for Banking & Financial Services FOLLOW THE MONEY |
2022-01-20 ⋅ Trellix ⋅ Update on WhisperGate, Destructive Malware Targeting Ukraine – Threat Intelligence & Protections Update WhisperGate |