Click here to download all references as Bib-File.•
2022-05-03
⋅
Cisco
⋅
Conti and Hive ransomware operations: Leveraging victim chats for insights Conti Hive |
2022-05-03
⋅
Zscaler
⋅
Analysis of BlackByte Ransomware's Go-Based Variants BlackByte |
2022-05-03
⋅
Cluster25
⋅
The Strange Link Between A Destructive Malware And A Ransomware-Gang Linked Custom Loader: IsaacWiper Vs Vatet Cobalt Strike IsaacWiper PyXie |
2022-05-02
⋅
cocomelonc
⋅
Malware development: persistence - part 3. COM DLL hijack. Simple C++ example Agent.BTZ Ave Maria Konni Mosquito TurlaRPC |
2022-05-02
⋅
eSentire
⋅
AsyncRAT Activity AsyncRAT |
2022-05-02
⋅
Maurice's Blog
⋅
Detecting Hypervisor-assisted Hooking |
2022-05-02
⋅
LIFARS
⋅
A Deep Dive into AvosLocker Ransomware AvosLocker |
2022-05-02
⋅
Cisco Talos
⋅
Conti and Hive ransomware operations: Leveraging victim chats for insights Cobalt Strike Conti Hive |
2022-05-02
⋅
YouTube (S4 Events)
⋅
PIPEDREAM – Most Flexible & Capable ICS Malware To Date |
2022-05-02
⋅
Trend Micro
⋅
AvosLocker Ransomware Variant Abuses Driver File to Disable Anti-Virus, Scans for Log4shell AvosLocker |
2022-05-02
⋅
Sentinel LABS
⋅
Moshen Dragon’s Triad-and-Error Approach | Abusing Security Software to Sideload PlugX and ShadowPad PlugX ShadowPad Moshen Dragon |
2022-05-02
⋅
AT&T
⋅
Analysis on recent wiper attacks: examples and how wiper malware works AcidRain CaddyWiper DoubleZero HermeticWiper INDUSTROYER2 IsaacWiper |
2022-05-02
⋅
⋅
Macnica
⋅
Attack Campaigns that Exploit Shortcuts and ISO Files Cobalt Strike |
2022-05-02
⋅
Mandiant
⋅
UNC3524: Eye Spy on Your Email QUIETEXIT UNC3524 |
2022-05-01
⋅
Github (k-vitali)
⋅
REvil Reborn Ransom Config REvil |
2022-05-01
⋅
BushidoToken
⋅
Gamer Cheater Hacker Spy Egregor HelloKitty NetfilterRootkit RagnarLocker Winnti |
2022-05-01
⋅
Bleeping Computer
⋅
REvil ransomware returns: New malware sample confirms gang is back REvil |
2022-04-30
⋅
Cybereason
⋅
PortDoor: New Chinese APT Backdoor Attack Targets Russian Defense Sector PortDoor |
2022-04-30
⋅
Bleeping Computer
⋅
Fake Windows 10 updates infect you with Magniber ransomware Magniber |
2022-04-29
⋅
Team Cymru
⋅
Sliver Case Study: Assessing Common Offensive Security Tools The Use of the Sliver C2 Framework for Malicious Purposes Sliver |