Click here to download all references as Bib-File.•
2022-02-02
⋅
IBM
⋅
TrickBot Gang Uses Template-Based Metaprogramming in Bazar Malware BazarBackdoor TrickBot |
2022-02-02
⋅
SecurityAffairs
⋅
Experts warn of a spike in APT35 activity and a possible link to Memento ransomware op |
2022-02-02
⋅
lodestone
⋅
White Rabbit Continued: Sardonic and F5 |
2022-02-02
⋅
CNN
⋅
US officials prepare for potential Russian cyberattacks as Ukraine standoff continues |
2022-02-01
⋅
Mandiant
⋅
Zoom For You — SEO Poisoning to Distribute BATLOADER and Atera Agent BATLOADER |
2022-02-01
⋅
⋅
Cert-UA
⋅
Cyber attack of the UAC-0010 group (Armageddon) on the state organizations of Ukraine (CERT-UA#3787) Gamaredon Group |
2022-02-01
⋅
3xp0rt
⋅
Mars Stealer: Oski refactoring Mars Stealer Oski Stealer |
2022-02-01
⋅
Xenomorph: A newly hatched Banking Trojan Xenomorph |
2022-02-01
⋅
Cyborg Security
⋅
WhisperGate Malware - Update WhisperGate |
2022-02-01
⋅
Wired
⋅
Inside Trickbot, Russia’s Notorious Ransomware Gang TrickBot |
2022-02-01
⋅
SentinelOne
⋅
Sneaky Spies and Backdoor RATs | SysJoker and DazzleSpy Malware Target macOS DazzleSpy SysJoker |
2022-02-01
⋅
BleepingComputer
⋅
Cyberspies linked to Memento ransomware use new PowerShell malware |
2022-02-01
⋅
Sophos
⋅
SolarMarker campaign used novel registry changes to establish persistence solarmarker |
2022-02-01
⋅
Cybereason
⋅
StrifeWater RAT: Iranian APT Moses Staff Adds New Trojan to Ransomware Operations StrifeWater RAT MosesStaff |
2022-02-01
⋅
Max Kersten's Blog
⋅
Dumping WhisperGate’s wiper from an Eazfuscator obfuscated loader WhisperGate |
2022-02-01
⋅
Wired
⋅
Inside Trickbot, Russia’s Notorious Ransomware Gang TrickBot |
2022-02-01
⋅
Youtube (OALabs)
⋅
How To Unpack VMProtect 3 (x64) Night Sky Ransomware With VMPDump [Patreon Unlocked] NightSky |
2022-02-01
⋅
Cybereason
⋅
PowerLess Trojan: Iranian APT Phosphorus Adds New PowerShell Backdoor for Espionage |
2022-01-31
⋅
Cyber Geeks
⋅
A Detailed Analysis Of Lazarus APT Malware Disguised As Notepad++ Shell Extension AnchorMTea |
2022-01-31
⋅
CyberArk
⋅
Analyzing Malware with Hooks, Stomps and Return-addresses Cobalt Strike |