Click here to download all references as Bib-File.•
| 2022-09-22
            
            ⋅
            
            Recorded Future
            ⋅ Chinese State-Sponsored Group TA413 Adopts New Capabilities in Pursuit of Tibetan Targets 8.t Dropper LOWZERO | 
| 2022-09-22
            
            ⋅
            
            Microsoft
            ⋅ Malicious OAuth applications used to compromise email servers and spread spam | 
| 2022-09-22
            
            ⋅
            
            Github (muha2xmad)
            ⋅ Technical analysis of Ginp android malware Ginp | 
| 2022-09-22
            
            ⋅
            
            Broadcom
            ⋅ Noberus Ransomware: Darkside and BlackMatter Successor Continues to Evolve its Tactics BlackCat BlackMatter DarkSide | 
| 2022-09-22
            
            ⋅
            
            Cyber Geeks
            ⋅ A Technical Analysis Of The Leaked LOCKBIT 3.0 Builder LockBit | 
| 2022-09-22
            
            ⋅
            
            Avast
            ⋅ Raspberry Robin’s Roshtyak: A Little Lesson in Trickery Raspberry Robin Roshtyak | 
| 2022-09-21
            
            ⋅
            
            Gdata
            ⋅ Identifying file manipulation in system files | 
| 2022-09-21
            
            ⋅
            
            Zscaler
            ⋅ Technical Analysis of Crytox Ransomware Crytox | 
| 2022-09-21
            
            ⋅
            
            Microsoft
            ⋅ Rewards plus: Fake mobile banking rewards apps lure users to install info-stealing RAT on Android devices | 
| 2022-09-21
            
            ⋅
            
            Microsoft
            ⋅ The art and science behind Microsoft threat hunting: Part 2 | 
| 2022-09-21
            
            ⋅
            
            Check Point
            ⋅ Native function and Assembly Code Invocation MiniDuke | 
| 2022-09-21
            
            ⋅
            
            CISA
            ⋅ AA22-264A: Iranian State Actors Conduct Cyber Operations Against the Government of Albania (PDF) Unidentified 095 (Iranian Wiper) | 
| 2022-09-21
            
            ⋅
            
            CISA
            ⋅ Alert (AA22-264A) Iranian State Actors Conduct Cyber Operations Against the Government of Albania Unidentified 095 (Iranian Wiper) | 
| 2022-09-21
            
            ⋅
            
            Twitter (@0xToxin)
            ⋅ doenerium phishing campaign doenerium | 
| 2022-09-21
            
            ⋅
            
            BitSight
            ⋅ SystemBC: The Multipurpose Proxy Bot Still Breathes SystemBC | 
| 2022-09-21
            
            ⋅
            
            Github (muha2xmad)
            ⋅ Technical analysis of Hydra android malware Hydra Joker | 
| 2022-09-20
            
            ⋅ Malware development: persistence - part 11. Powershell profile. Simple C++ example. Turla RAT TurlaRPC | 
| 2022-09-20
            
            ⋅
            
            vmware
            ⋅ Threat Report: Illuminating Volume Shadow Deletion Conti HelloKitty | 
| 2022-09-20
            
            ⋅
            
            vmware
            ⋅ Threat Research: New Method of Volume Shadow Backup Deletion Seen in Recent Ransomware | 
| 2022-09-20
            
            ⋅
            
            Recorded Future
            ⋅ Threat Actors Continue to Abuse Google Tag Manager for Payment Card e-Skimming |