Click here to download all references as Bib-File.•
2020-01-25
⋅
Github (k-vitali)
⋅
Extracted Config for Ragnarok Ransomware Ragnarok |
2020-01-25
⋅
Sanguine Security
⋅
Indonesian Magecart hackers arrested magecart |
2020-01-25
⋅
GoggleHeadedHacker Blog
⋅
Olympic Ticket Reseller Magecart Infection magecart |
2020-01-23
⋅
Bleeping Computer
⋅
TrickBot Now Steals Windows Active Directory Credentials TrickBot |
2020-01-23
⋅
Threatpost
⋅
Shlayer, No. 1 Threat for Mac, Targets YouTube, Wikipedia Shlayer |
2020-01-23
⋅
Palo Alto Networks Unit 42
⋅
The Fractured Statue Campaign: U.S. Government Targeted in Spear-Phishing Attacks CARROTBALL CarrotBat Syscon |
2020-01-21
⋅
Palo Alto Networks Unit 42
⋅
Muhstik Botnet Attacks Tomato Routers to Harvest New IoT Devices Tsunami |
2020-01-20
⋅
Intezer
⋅
Linux Rekoobe Operating with New, Undetected Malware Samples Rekoobe |
2020-01-19
⋅
360
⋅
BayWorld event, Cyber Attack Against Foreign Trade Industry Azorult Formbook Nanocore RAT Revenge RAT |
2020-01-18
⋅
Bleeping Computer
⋅
New Jersey Synagogue Suffers Sodinokibi Ransomware Attack REvil |
2020-01-17
⋅
FireEye
⋅
State of the Hack: Spotlight Iran - from Cain & Abel to full SANDSPY QUADAGENT Fox Kitten |
2020-01-17
⋅
The Register
⋅
'Friendly' hackers are seemingly fixing the Citrix server hole – and leaving a nasty present behind NOTROBIN NOTROBIN |
2020-01-17
⋅
Security-in-Bits
⋅
Unpacking Pyrogenic/Qealler using Java agent -Part 0x2 Qealler |
2020-01-17
⋅
Secureworks
⋅
Is It Wrong to Try to Find APT Techniques in Ransomware Attack? Defray Dharma FriedEx Gandcrab GlobeImposter Matrix Ransom MedusaLocker Phobos REvil Ryuk SamSam Scarab Ransomware |
2020-01-17
⋅
JPCERT/CC
⋅
Looking back on the incidents in 2019 TSCookie NodeRAT Emotet PoshC2 Quasar RAT |
2020-01-17
⋅
100 more behind cockroaches? MoqHao Emotet Predator The Thief |
2020-01-17
⋅
FireEye
⋅
404 Exploit Not Found: Vigilante Deploying Mitigation for Citrix NetScaler Vulnerability While Maintaining Backdoor NOTROBIN NOTROBIN |
2020-01-16
⋅
Bleeping Computer
⋅
TrickBot Now Uses a Windows 10 UAC Bypass to Evade Detection TrickBot |
2020-01-15
⋅
Lab52
⋅
APT-C-36 recent activity analysis LimeRAT APT-C-36 |
2020-01-15
⋅
Marco Ramilli's Blog
⋅
Iranian Threat Actors: Preliminary Analysis POWERSTATS |