Click here to download all references as Bib-File.•
| 2022-09-20
            
            ⋅
            
            vmware
            ⋅ Threat Research: New Method of Volume Shadow Backup Deletion Seen in Recent Ransomware | 
| 2022-09-20
            
            ⋅
            
            Recorded Future
            ⋅ Threat Actors Continue to Abuse Google Tag Manager for Payment Card e-Skimming | 
| 2022-09-19
            
            ⋅
            
            CyberScoop
            ⋅ Hacking group focused on Central America dumps 10 terabytes of military emails, files Guacamaya | 
| 2022-09-19
            
            ⋅
            
            Fortinet
            ⋅ Excel Document Delivers Multiple Malware By Exploiting CVE-2017-11882 – Part I Formbook RedLine Stealer | 
| 2022-09-19
            
            ⋅
            
            Virus Bulletin
            ⋅ Tracking the entire iceberg - long-term APT malware C2 protocol emulation and scanning ShadowPad Winnti | 
| 2022-09-19
            
            ⋅
            
            Recorded Future
            ⋅ Russia-Nexus UAC-0113 Emulating Telecommunication Providers in Ukraine Ave Maria Colibri Loader DCRat | 
| 2022-09-19
            
            ⋅
            
            vmware
            ⋅ The Evolution of the Chromeloader Malware Choziosi | 
| 2022-09-18
            
            ⋅
            
            K7 Security
            ⋅ Raccoon back with new claws! Raccoon | 
| 2022-09-17
            
            ⋅
            
            Twitter (@MsftSecIntel)
            ⋅ Tweet on click fraud activity DEV-0796 Phlox Tempest | 
| 2022-09-16
            
            ⋅
            
            Cloudsek
            ⋅ Recordbreaker: The Resurgence of Raccoon Raccoon RecordBreaker | 
| 2022-09-16
            
            ⋅
            
            Palo Alto Networks Unit 42
            ⋅ Zero-Day Exploit Detection Using Machine Learning | 
| 2022-09-16
            
            ⋅
            
            spookysec
            ⋅ Deception in Depth - Building Deceptions from Breaches | 
| 2022-09-16
            
            ⋅
            
            Group-IB
            ⋅ Tweet on Uber Employees potentially infected with Raccoon and Vidar stealer Raccoon Vidar | 
| 2022-09-16
            
            ⋅
            
            Bleeping Computer
            ⋅ Uber hacked, internal systems breached and vulnerability reports stolen | 
| 2022-09-16
            
            ⋅
            
            GovCERT.ch
            ⋅ Unflattening ConfuserEx .NET Code in IDA Ginzo Stealer | 
| 2022-09-16
            
            ⋅
            
            muha2xmad
            ⋅ Tweets about Hydra android malware Hydra | 
| 2022-09-15
            
            ⋅
            
            IT Security Guru
            ⋅ Documents For Sale on the Dark Web Adrastea | 
| 2022-09-15
            
            ⋅
            
            DuskRise
            ⋅ Erbium InfoStealer Enters the Scene: Characteristics and Origins Erbium Stealer | 
| 2022-09-15
            
            ⋅
            
            SentinelOne
            ⋅ From the Front Lines | Slam! Anatomy of a Publicly-Available Ransomware Builder Slam | 
| 2022-09-15
            
            ⋅
            
            Symantec
            ⋅ Webworm: Espionage Attackers Testing and Using Older Modified RATs 9002 RAT Ghost RAT Trochilus RAT |