Click here to download all references as Bib-File.•
2020-05-16
⋅
Cado Security
⋅
Recent Attacks Against Supercomputers Loerbas |
2020-05-15
⋅
SentinelOne
⋅
A Guide to macOS Threat Hunting and Incident Response |
2020-05-15
⋅
MalwareLab.pl
⋅
In depth analysis of Lazarus validator |
2020-05-15
⋅
Twitter (@nunohaien)
⋅
Twitter Thread on attacks on high-performance computing labs Loerbas |
2020-05-14
⋅
Avast Decoded
⋅
APT Group Planted Backdoors Targeting High Profile Networks in Central Asia BYEBY Ghost RAT Microcin MimiKatz Vicious Panda |
2020-05-14
⋅
ESET Research
⋅
Mikroceen: Spying backdoor leveraged in high‑profile networks in Central Asia Microcin Vicious Panda |
2020-05-14
⋅
paloalto Networks Unit 42
⋅
Mirai and Hoaxcalls Botnets Target Legacy Symantec Web Gateways Bashlite Mirai |
2020-05-14
⋅
SophosLabs
⋅
RATicate: an attacker’s waves of information-stealing malware Agent Tesla BetaBot BlackRemote Formbook Loki Password Stealer (PWS) NetWire RC NjRAT Remcos |
2020-05-14
⋅
360 Total Security
⋅
Vendetta - new threat actor from Europe Nanocore RAT Remcos |
2020-05-14
⋅
Telekom
⋅
LOLSnif – Tracking Another Ursnif-Based Targeted Campaign LOLSnif |
2020-05-14
⋅
ESET Research
⋅
Mikroceen: Spying backdoor leveraged in high‑profile networks in Central Asia BYEBY Microcin |
2020-05-14
⋅
Avast Decoded
⋅
APT Group Planted Backdoors Targeting High Profile Networks in Central Asia BYEBY Microcin |
2020-05-13
⋅
KELA
⋅
Access-as-a-Service – Remote Access Markets in the Cybercrime Underground |
2020-05-13
⋅
Bitdefender
⋅
Global Ransomware and Cyberattacks on Healthcare Spike during Pandemic |
2020-05-13
⋅
Malpedia Family Page for Kiralock (Placeholder) |
2020-05-13
⋅
ESET Research
⋅
Ramsay: A cyber‑espionage toolkit tailored for air‑gapped networks Ramsay Retro |
2020-05-12
⋅
Yet Another Security Blog
⋅
Evading Detection with Excel 4.0 Macros and the BIFF8 XLS Format Zloader |
2020-05-12
⋅
FireEye
⋅
Analyzing Dark Crystal RAT, a C# backdoor DCRat |
2020-05-12
⋅
Trend Micro
⋅
Tropic Trooper’s Back: USBferry Attack Targets Air-gapped Environments (Technical Brief) USBferry |
2020-05-12
⋅
Trend Micro
⋅
Tropic Trooper’s Back: USBferry Attack Targets Air-gapped Environments USBferry |