Click here to download all references as Bib-File.•
2022-01-14
⋅
Advanced Intelligence
⋅
Storm in "Safe Haven": Takeaways from Russian Authorities Takedown of REvil REvil REvil |
2022-01-14
⋅
Mandiant
⋅
Proactive Preparation and Hardening to Protect Against Destructive Attacks |
2022-01-14
⋅
Twitter (@billyleonard)
⋅
Tweet on APT28 credential phishing campaigns targeting Ukraine |
2022-01-14
⋅
RiskIQ
⋅
RiskIQ: Unique SSL Certificates and JARM Hash Connected to Emotet and Dridex C2 Servers Dridex Emotet |
2022-01-14
⋅
HP
⋅
How Attackers Use XLL Malware to Infect Systems |
2022-01-13
⋅
Kaspersky Labs
⋅
The BlueNoroff cryptocurrency hunt is still on CageyChameleon SnatchCrypto WebbyTea |
2022-01-13
⋅
muha2xmad
⋅
Unpacking Remcos malware Remcos |
2022-01-13
⋅
Trustwave
⋅
Decrypting Qakbot’s Encrypted Registry Keys QakBot |
2022-01-13
⋅
Blackberry
⋅
Threat Thursday: Jupyter Infostealer is a Master of Disguise solarmarker |
2022-01-13
⋅
Twitter (@8th_grey_owl)
⋅
Tweet on SelfMake Loader SelfMake Loader |
2022-01-13
⋅
CrowdStrike
⋅
Linux-Targeted Malware Increases by 35% in 2021: XorDDoS, Mirai and Mozi Most Prevalent Mirai Mozi XOR DDoS |
2022-01-12
⋅
BleepingComputer
⋅
Hackers take over diplomat's email, target Russian deputy minister Konni |
2022-01-12
⋅
Avast
⋅
Exploit Kits vs. Google Chrome Magniber UnderminerEK |
2022-01-12
⋅
Cyber And Ramen blog
⋅
Analysis of njRAT PowerPoint Macros NjRAT |
2022-01-12
⋅
muha2xmad
⋅
Unpacking Ramnit malware Ramnit |
2022-01-12
⋅
Lab52
⋅
TokyoX: DLL side-loading an unknown artifact (Part 2) TokyoX |
2022-01-12
⋅
Netskope
⋅
Abusing Microsoft Office Using Malicious Web Archive Files |
2022-01-12
⋅
Github (Dump-GUY)
⋅
NightSky Ransomware – just a Rook RW fork in VMProtect suit Rook |
2022-01-11
⋅
Twitter (@cglyer)
⋅
Tweet on CN based ransomware operator using log4shell to deploy NightSky NightSky BRONZE STARLIGHT |
2022-01-11
⋅
BleepingComputer
⋅
New SysJoker backdoor targets Windows, macOS, and Linux SysJoker SysJoker SysJoker |