Click here to download all references as Bib-File.•
2020-03-02
⋅
TechCrunch
⋅
Visser, a parts manufacturer for Tesla and SpaceX, confirms data breach DoppelPaymer |
2020-03-02
⋅
Telsy
⋅
APT34 (aka OilRig, aka Helix Kitten) attacks Lebanon government entities with MailDropper implants Karkoff |
2020-03-02
⋅
Qihoo 360 Technology
⋅
The CIA Hacking Group (APT-C-39) Conducts Cyber-Espionage Operation on China's Critical Industries for 11 Years Longhorn |
2020-03-02
⋅
Virus Bulletin
⋅
Pulling the PKPLUG: the adversary playbook for the long-standing espionage activity of a Chinese nation-state adversary HenBox Farseer PlugX Poison Ivy |
2020-03-01
⋅
Dr.Web
⋅
BackDoor.Spyder.1 Spyder |
2020-02-28
⋅
Financial Security Institute
⋅
Profiling of TA505 Threat Group That Continues to Attack the Financial Sector Amadey Clop FlawedAmmyy Rapid Ransom SDBbot TinyMet |
2020-02-26
⋅
MetaSwan's Lab
⋅
Lazarus group's Brambul worm of the former Wannacry - 2 Brambul |
2020-02-26
⋅
MetaSwan's Lab
⋅
Lazarus group's Brambul worm of the former Wannacry - 1 Brambul WannaCryptor |
2020-02-26
⋅
Bleeping Computer
⋅
Sodinokibi Ransomware May Tip NASDAQ on Attacks to Hurt Stock Prices REvil |
2020-02-26
⋅
MalwareLab.pl
⋅
(Ab)using bash-fu to analyze recent Aggah sample Agent Tesla |
2020-02-25
⋅
⋅
ID Ransomware
⋅
BlackKingdom Ransomware BlackKingdom Ransomware |
2020-02-25
⋅
SentinelOne
⋅
DPRK Hidden Cobra Update: North Korean Malicious Cyber Activity ARTFULPIE BISTROMATH BUFFETLINE CHEESETRAY HOPLIGHT HOTCROISSANT SLICKSHOES |
2020-02-24
⋅
CyberArk
⋅
Analyzing the Raccoon Stealer Raccoon |
2020-02-24
⋅
Dragos
⋅
2019 Year In Review: The ICS Landscape and Threat Actviity Groups Fox Kitten |
2020-02-24
⋅
Sophos Labs
⋅
Cloud Snooper attack bypasses firewall security measures Cloud Snooper |
2020-02-22
⋅
Comae
⋅
Active Email Campaign Identified With Malicious Excel Files |
2020-02-20
⋅
McAfee
⋅
CSI: Evidence Indicators for Targeted Ransomware Attacks – Part II Cobalt Strike LockerGoga Maze MegaCortex |
2020-02-20
⋅
NCSC UK
⋅
UK condemns Russia's GRU over Georgia cyber-attacks |
2020-02-20
⋅
ZDNet
⋅
Croatia's largest petrol station chain impacted by cyber-attack Clop |
2020-02-20
⋅
Carbon Black
⋅
Threat Analysis: Active C2 Discovery Using Protocol Emulation Part2 (Winnti 4.0) Winnti |