Click here to download all references as Bib-File.•
2021-12-01
⋅
⋅
ID Ransomware
⋅
BlackCat Ransomware BlackCat |
2021-12-01
⋅
RiskIQ
⋅
Bulletproof Hosting Services: Investigating Shinjiru Technology Sdn Bhd |
2021-12-01
⋅
⋅
Microstep Intelligence Bureau
⋅
BlackTech, an East Asian hacking group, has launched attacks in sectors such as finance and education |
2021-12-01
⋅
Avast
⋅
Toss a Coin to your Helper (Part 2 of 2) |
2021-12-01
⋅
Trend Micro
⋅
Analyzing How TeamTNT Used Compromised Docker Hub Accounts TeamTNT |
2021-12-01
⋅
Check Point
⋅
Smishing Botnets Going Viral in Iran |
2021-12-01
⋅
Proofpoint
⋅
Injection is the New Black: Novel RTF Template Inject Technique Poised for Widespread Adoption Beyond APT Actors |
2021-12-01
⋅
NCC Group
⋅
Tracking a P2P network related to TA505 FlawedGrace Necurs |
2021-11-30
⋅
Deep instinct
⋅
The Re-Emergence of Emotet Emotet |
2021-11-30
⋅
Canadian Centre for Cyber Security
⋅
Ransomware playbook ITSM.00.099 |
2021-11-30
⋅
⋅
Qianxin
⋅
Cyberspace's Magic Eye: PROMETHIUM Fakes attack activity analysis of NotePads and installation packages StrongPity |
2021-11-30
⋅
360 netlab
⋅
EwDoor Botnet Is Attacking AT&T Customers EwDoor |
2021-11-30
⋅
Medium nusenu
⋅
Is "KAX17" performing de-anonymization Attacks against Tor Users? KAX17 |
2021-11-30
⋅
Red Canary
⋅
ProxyShell exploitation leads to BlackByte ransomware BlackByte |
2021-11-30
⋅
CYBER GEEKS All Things Infosec
⋅
Just another analysis of the njRAT malware – A step-by-step approach NjRAT |
2021-11-29
⋅
Kaspersky
⋅
ScarCruft surveilling North Korean defectors and human rights activists Chinotto Chinotto PoorWeb |
2021-11-29
⋅
Kaspersky
⋅
WIRTE’s campaign in the Middle East ‘living off the land’ since at least 2019 WIRTE |
2021-11-29
⋅
Trend Micro
⋅
Campaign Abusing Legitimate Remote Administrator Tools Uses Fake Cryptocurrency Websites AsyncRAT Azorult Nanocore RAT NjRAT RedLine Stealer Remcos |
2021-11-29
⋅
Certitude
⋅
Unpatched Exchange Servers distribute Phishing Links (SquirrelWaffle) Squirrelwaffle |
2021-11-29
⋅
CrowdStrike
⋅
Nowhere to Hide: Detecting SILENT CHOLLIMA’s Custom Tooling |