Click here to download all references as Bib-File.•
2019-12-21
⋅
Decrypt
⋅
How ransomware exploded in the age of Bitcoin Ryuk |
2019-12-21
⋅
Twitter (@zlab_team)
⋅
Tweet on Possible New Threatactor JSOutProx |
2019-12-19
⋅
⋅
VinCSS
⋅
[RE009] Analysis of malicious code "PLAN, KEY TASKS IN 2020.doc" attached to phishing email Unidentified 074 (Downloader) |
2019-12-19
⋅
KrebsOnSecurity
⋅
Inside ‘Evil Corp,’ a $100M Cybercrime Menace Dridex Gameover P2P Zeus Evil Corp |
2019-12-19
⋅
Fox-IT
⋅
Operation Wocao: Shining a light on one of China’s hidden hacking groups XServer |
2019-12-19
⋅
Fox-IT
⋅
Operation Wocao : Shining a light on one of China’s hidden hacking groups APT20 Operation Wocao |
2019-12-18
⋅
Github (psrok1)
⋅
IcedID PNG Extractor IcedID |
2019-12-17
⋅
Blueliv
⋅
TA505 evolves ServHelper, uses Predator The Thief and Team Viewer Hijacking ServHelper TA505 |
2019-12-17
⋅
Cisco
⋅
Incident Response lessons from recent Maze ransomware attacks Maze |
2019-12-17
⋅
Palo Alto Networks Unit 42
⋅
Rancor: Cyber Espionage Group Uses New Custom Malware to Attack Southeast Asia DDKONG Derusbi KHRAT |
2019-12-17
⋅
⋅
Netlab
⋅
Lazarus Group uses Dacls RAT to attack Linux platform Dacls Log Collector Dacls |
2019-12-16
⋅
Trend Micro
⋅
Momentum Botnet's Newest DDoS Attacks and IoT Exploits Momentum |
2019-12-15
⋅
Bleeping Computer
⋅
Ryuk Ransomware Likely Behind New Orleans Cyberattack Ryuk |
2019-12-13
⋅
Palo Alto Networks Unit 42
⋅
Mirai Variant ECHOBOT Resurfaces with 13 Previously Unexploited Vulnerabilities Echobot Mirai |
2019-12-12
⋅
Trend Micro
⋅
More than a Dozen Obfuscated APT33 Botnets Used for Extreme Narrow Targeting APT33 |
2019-12-11
⋅
Bleeping Computer
⋅
Maze Ransomware Behind Pensacola Cyberattack, $1M Ransom Demand Maze |
2019-12-10
⋅
Confiant
⋅
New macOS Bundlore Loader Analysis Bundlore |
2019-12-09
⋅
Palo Alto Networks Unit 42
⋅
TrickBot Campaign Uses Fake Payroll Emails to Conduct Phishing Attacks TrickBot |
2019-12-05
⋅
⋅
Github (blackorbird)
⋅
APT32 Report Cobalt Strike |
2019-12-05
⋅
Marco Ramilli's Blog
⋅
APT28 Attacks Evolution APT28 |