Click here to download all references as Bib-File.•
2022-05-19
⋅
InfoSec Handlers Diary Blog
⋅
Bumblebee Malware from TransferXL URLs BumbleBee Cobalt Strike |
2022-05-19
⋅
Mandiant
⋅
The IO Offensive: Information Operations Surrounding the Russian Invasion of Ukraine HermeticWiper PartyTicket |
2022-05-19
⋅
Check Point
⋅
Twisted Panda: Chinese APT espionage operation against Russian’s state-owned defense institutes |
2022-05-19
⋅
IBM
⋅
ITG23 Crypters Highlight Cooperation Between Cybercriminal Groups IcedID ISFB Mount Locker WIZARD SPIDER |
2022-05-19
⋅
Google
⋅
Protecting Android users from 0-Day attacks |
2022-05-19
⋅
Zscaler
⋅
Vidar distributed through backdoored Windows 11 downloads and abusing Telegram Vidar |
2022-05-19
⋅
SentinelOne
⋅
CrateDepression | Rust Supply-Chain Attack Infects Cloud CI Pipelines with Go Malware |
2022-05-19
⋅
Palo Alto Networks Unit 42
⋅
Weaponization of Excel Add-Ins Part 2: Dridex Infection Chain Case Studies Dridex |
2022-05-19
⋅
Blackberry
⋅
.NET Stubs: Sowing the Seeds of Discord Agent Tesla Quasar RAT WhisperGate |
2022-05-19
⋅
Microsoft
⋅
Rise in XorDdos: A deeper look at the stealthy DDoS malware targeting Linux devices XOR DDoS |
2022-05-18
⋅
Github (0x00-0x7f)
⋅
A Case of Vidar Infostealer - Part 2 Vidar |
2022-05-18
⋅
K7 Security
⋅
Steer Clear of Instant Loan Apps |
2022-05-18
⋅
Yoroi
⋅
A deep dive into Eternity Group: A new emerging Cyber Threat Eternity Ransomware Eternity Stealer Eternity Worm Lilith |
2022-05-18
⋅
PRODAFT Threat Intelligence
⋅
Wizard Spider In-Depth Analysis Cobalt Strike Conti WIZARD SPIDER |
2022-05-18
⋅
Trend Micro
⋅
Uncovering a Kingminer Botnet Attack Using Trend Micro™ Managed XDR Kingminer |
2022-05-18
⋅
Cado Security
⋅
Linux Attack Techniques: Dynamic Linker Hijacking with LD Preload |
2022-05-18
⋅
ntop
⋅
How ntopng monitors IEC 60870-5-104 traffic INDUSTROYER2 |
2022-05-18
⋅
⋅
Weixin
⋅
filesyncshell.dll hijacked? APT-C-24 Sidewinder Briefing on the Latest Attack Activity |
2022-05-18
⋅
Cisco Talos
⋅
The BlackByte ransomware group is striking users all over the globe BlackByte |
2022-05-18
⋅
eSentire
⋅
eSentire Threat Intelligence Malware Analysis: Mars Stealer Mars Stealer |