Click here to download all references as Bib-File.•
2022-07-27
⋅
K7 Security
⋅
Credential Stealer RedLine Reemerges RedLine Stealer |
2022-07-27
⋅
PressTV
⋅
Iraqi hacker group 'ALtahrea Team' targets Israeli IT, e-commerce companies in major cyber attack: Reports Altahrea Team |
2022-07-27
⋅
Darktrace
⋅
PrivateLoader: Network-Based Indicators of Compromise PrivateLoader SmokeLoader |
2022-07-27
⋅
Microsoft
⋅
Untangling KNOTWEED: European private-sector offensive actor using 0-day exploits Subzero Denim Tsunami |
2022-07-27
⋅
cyble
⋅
Targeted Attacks Being Carried Out Via DLL SideLoading Cobalt Strike QakBot |
2022-07-27
⋅
ReversingLabs
⋅
Threat analysis: Follina exploit fuels 'live-off-the-land' attacks Cobalt Strike MimiKatz |
2022-07-27
⋅
Elastic
⋅
Exploring the QBOT Attack Pattern QakBot |
2022-07-27
⋅
Elastic
⋅
QBOT Configuration Extractor QakBot |
2022-07-27
⋅
Qualys
⋅
Stealthy Quasar Evolving to Lead the RAT Race Quasar RAT |
2022-07-27
⋅
Trend Micro
⋅
Gootkit Loader’s Updated Tactics and Fileless Delivery of Cobalt Strike Cobalt Strike GootKit Kronos REvil SunCrypt |
2022-07-27
⋅
SANS ISC
⋅
IcedID (Bokbot) with Dark VNC and Cobalt Strike DarkVNC IcedID |
2022-07-26
⋅
IronNet
⋅
Robin Banks might be robbing your bank |
2022-07-26
⋅
WithSecure
⋅
DUCKTAIL: An infostealer malware targeting Facebook Business accounts DUCKTAIL |
2022-07-26
⋅
Mandiant
⋅
Mandiant Red Team Emulates FIN11 Tactics To Control Operational Technology Servers Clop Industroyer MimiKatz Triton |
2022-07-26
⋅
CYBER GEEKS All Things Infosec
⋅
HOW to Analyze Linux Malware - A Case Study of Symbiote Symbiote |
2022-07-26
⋅
splunk
⋅
ML Detection of Risky Command Exploit |
2022-07-26
⋅
Yoroi
⋅
On the FootSteps of Hive Ransomware Hive Hive |
2022-07-26
⋅
Cyber Geeks
⋅
How To Analyze Linux Malware – A Case Study Of Symbiote Symbiote |
2022-07-26
⋅
⋅
Cert-UA
⋅
UAC-0010 (Armageddon) cyberattacks using the GammaLoad.PS1_v2 malware (CERT-UA#5003,5013,5069,5071) Gamaredon Group |
2022-07-26
⋅
Microsoft
⋅
Malicious IIS extensions quietly open persistent backdoors into servers CHINACHOPPER MimiKatz |