Click here to download all references as Bib-File.•
2022-09-22
⋅
SentinelOne
⋅
The Mystery of Metador | An Unattributed Threat Hiding in Telcos, ISPs, and Universities |
2022-09-08
⋅
Cybereason
⋅
Threat Analysis Report: PlugX RAT Loader Evolution PlugX |
2022-09-08
⋅
Sentinel LABS
⋅
Crimeware Trends | Ransomware Developers Turn to Intermittent Encryption to Evade Detection AgendaCrypt Black Basta BlackCat PLAY |
2022-09-01
⋅
Sentinel LABS
⋅
The Mystery of Metador | An Unattributed Threat Hiding in Telcos, ISPs, and Universities |
2022-07-21
⋅
Sentinel LABS
⋅
LockBit 3.0 Update | Unpicking the Ransomware’s Latest Anti-Analysis and Evasion Techniques LockBit |
2022-04-25
⋅
Cybereason
⋅
THREAT ANALYSIS REPORT: SocGholish and Zloader – From Fake Updates and Installers to Owning Your Systems FAKEUPDATES Zloader |
2021-12-16
⋅
Cybereason
⋅
Inside the LockBit Arsenal - The StealBit Exfiltration Tool LockBit StealBit |
2021-11-09
⋅
Cybereason
⋅
THREAT ANALYSIS REPORT: From Shatak Emails to the Conti Ransomware Cobalt Strike Conti |
2021-10-28
⋅
Cybereason
⋅
THREAT ANALYSIS REPORT: Snake Infostealer Malware 404 Keylogger |
2021-10-27
⋅
Cybereason
⋅
THREAT ALERT: Malicious Code Implant in the UAParser.js Library |
2021-09-27
⋅
Cybereason
⋅
Threat Analysis Report: Inside the Destructive PYSA Ransomware Mespinoza |
2021-09-22
⋅
Cybereason
⋅
Threat Analysis Report: PrintNightmare and Magniber Ransomware Magniber |