Click here to download all references as Bib-File.•
2020-11-26
⋅
SUCURI
⋅
Hackers Love Expired Domains |
2020-11-25
⋅
Uptycs
⋅
Warzone RAT comes with UAC bypass technique Ave Maria |
2020-11-25
⋅
Avanan
⋅
Microsoft Teams: New Attack Form Almost Takes Down Global Financial Institution |
2020-11-24
⋅
Congressional Research Service
⋅
Russian Military Intelligence: Background and Issues for Congress |
2020-11-24
⋅
360 netlab
⋅
Blackrota, a heavily obfuscated backdoor written in Go Blackrota |
2020-11-24
⋅
Intezer
⋅
Stantinko’s Proxy After Your Apache Server Stantinko |
2020-11-23
⋅
Youtube (OWASP DevSlop)
⋅
Compromised Compilers - A new perspective of supply chain cyber attacks ShadowPad |
2020-11-22
⋅
FireEye
⋅
Election Cyber Threats in the Asia-Pacific Region |
2020-11-22
⋅
Irshad's Blog
⋅
Analyzing an Emotet Dropper and Writing a Python Script to Statically Unpack Payload. Emotet |
2020-11-20
⋅
360
⋅
360 File-less Attack Protection Intercepts the Banker Trojan BBtok Active in Mexico BBtok |
2020-11-20
⋅
Trend Micro
⋅
Weaponizing Open Source Software for Targeted Attacks LaZagne Defray PlugX |
2020-11-20
⋅
Group-IB
⋅
The Locking Egregor Egregor QakBot |
2020-11-20
⋅
DomainTools
⋅
Current Events to Widespread Campaigns: Pivoting from Samples to Identify Activity |
2020-11-20
⋅
⋅
360 netlab
⋅
Blackrota, a highly obfuscated backdoor developed by Go Cobalt Strike |
2020-11-19
⋅
ioactive
⋅
Hiding in the Noise |
2020-11-19
⋅
FireEye
⋅
Purgalicious VBA: Macro Obfuscation With VBA Purging |
2020-11-19
⋅
GEMINI
⋅
Chinese Scam Shops Lure Black Friday Shoppers |
2020-11-19
⋅
Cofense
⋅
Threat Actor Utilizes COVID-19 Uncertainty to Target Users |
2020-11-18
⋅
VMRay
⋅
Malware Analysis Spotlight: AZORult Delivered by GuLoader Azorult CloudEyE |
2020-11-18
⋅
Seqrite
⋅
Thanos Ransomware Evading Anti-ransomware Protection With RIPlace Tactic Hakbit |