Click here to download all references as Bib-File.•
2022-10-03
⋅
Check Point Research
⋅
3rd October – Threat Intelligence Report Guacamaya |
2022-10-03
⋅
vmware
⋅
Emotet Exposed: A Look Inside the Cybercriminal Supply Chain Emotet |
2022-10-01
⋅
Youtube (Virus Bulletin)
⋅
Uncovering a broad criminal ecosystem powered by one of the largest botnets, Glupteba. (slides) Glupteba |
2022-10-01
⋅
Youtube (Virus Bulletin)
⋅
Uncovering a broad criminal ecosystem powered by one of the largest botnets, Glupteba. Glupteba |
2022-09-30
⋅
Microsoft
⋅
Analyzing attacks using the Exchange vulnerabilities CVE-2022-41040 and CVE-2022-41082 |
2022-09-29
⋅
Microsoft
⋅
ZINC weaponizing open-source software BLINDINGCAN CLOUDBURST miniBlindingCan |
2022-09-29
⋅
Symantec
⋅
Witchetty: Group Uses Updated Toolset in Attacks on Governments in Middle East CHINACHOPPER Lookback MimiKatz PlugX Unidentified 096 (Keylogger) x4 Witchetty |
2022-09-28
⋅
Securonix
⋅
Securonix Threat Labs Security Advisory: Detecting STEEP#MAVERICK: New Covert Attack Campaign Targeting Military Contractors |
2022-09-28
⋅
vmware
⋅
ESXi-Targeting Ransomware: The Threats That Are After Your Virtual Machines (Part 1) Avoslocker Babuk Black Basta BlackCat BlackMatter Conti DarkSide HelloKitty Hive LockBit Luna RansomEXX RedAlert Ransomware REvil |
2022-09-28
⋅
Barracuda
⋅
Threat Spotlight: Continuing attacks on Atlassian Confluence zero day |
2022-09-23
⋅
humansecurity
⋅
Poseidon’s Offspring: Charybdis and Scylla |
2022-09-22
⋅
SentinelOne
⋅
The Mystery of Metador | An Unattributed Threat Hiding in Telcos, ISPs, and Universities Metador |
2022-09-22
⋅
SentinelOne
⋅
The Mystery of Metador | An Unattributed Threat Hiding in Telcos, ISPs, and Universities |
2022-09-22
⋅
Broadcom
⋅
Noberus Ransomware: Darkside and BlackMatter Successor Continues to Evolve its Tactics BlackCat BlackMatter DarkSide |
2022-09-21
⋅
Microsoft
⋅
The art and science behind Microsoft threat hunting: Part 2 |
2022-09-20
⋅
vmware
⋅
Threat Report: Illuminating Volume Shadow Deletion Conti HelloKitty |
2022-09-20
⋅
vmware
⋅
Threat Research: New Method of Volume Shadow Backup Deletion Seen in Recent Ransomware |
2022-09-20
⋅
Recorded Future
⋅
Threat Actors Continue to Abuse Google Tag Manager for Payment Card e-Skimming |
2022-09-17
⋅
Twitter (@MsftSecIntel)
⋅
Tweet on click fraud activity DEV-0796 Phlox Tempest |
2022-09-15
⋅
DuskRise
⋅
Erbium InfoStealer Enters the Scene: Characteristics and Origins Erbium Stealer |