Click here to download all references as Bib-File.•
| 2022-07-28
⋅
McAfee
⋅
New HiddenAds malware affects 1M+ users and hides on the Google Play Store HiddenAd |
| 2022-07-28
⋅
SentinelOne
⋅
Living Off Windows Defender | LockBit Ransomware Sideloads Cobalt Strike Through Microsoft Security Tool Cobalt Strike LockBit |
| 2022-07-27
⋅
K7 Security
⋅
Credential Stealer RedLine Reemerges RedLine Stealer |
| 2022-07-27
⋅
PressTV
⋅
Iraqi hacker group 'ALtahrea Team' targets Israeli IT, e-commerce companies in major cyber attack: Reports Altahrea Team |
| 2022-07-27
⋅
Darktrace
⋅
PrivateLoader: Network-Based Indicators of Compromise PrivateLoader SmokeLoader |
| 2022-07-27
⋅
Microsoft
⋅
Untangling KNOTWEED: European private-sector offensive actor using 0-day exploits Subzero Denim Tsunami |
| 2022-07-27
⋅
cyble
⋅
Targeted Attacks Being Carried Out Via DLL SideLoading Cobalt Strike QakBot |
| 2022-07-27
⋅
ReversingLabs
⋅
Threat analysis: Follina exploit fuels 'live-off-the-land' attacks Cobalt Strike MimiKatz |
| 2022-07-27
⋅
Elastic
⋅
Exploring the QBOT Attack Pattern QakBot |
| 2022-07-27
⋅
Elastic
⋅
QBOT Configuration Extractor QakBot |
| 2022-07-27
⋅
Qualys
⋅
Stealthy Quasar Evolving to Lead the RAT Race Quasar RAT |
| 2022-07-27
⋅
Trend Micro
⋅
Gootkit Loader’s Updated Tactics and Fileless Delivery of Cobalt Strike Cobalt Strike GootKit Kronos REvil SunCrypt |
| 2022-07-27
⋅
SANS ISC
⋅
IcedID (Bokbot) with Dark VNC and Cobalt Strike DarkVNC IcedID |
| 2022-07-26
⋅
IronNet
⋅
Robin Banks might be robbing your bank |
| 2022-07-26
⋅
WithSecure
⋅
DUCKTAIL: An infostealer malware targeting Facebook Business accounts DUCKTAIL |
| 2022-07-26
⋅
Mandiant
⋅
Mandiant Red Team Emulates FIN11 Tactics To Control Operational Technology Servers Clop Industroyer MimiKatz Triton |
| 2022-07-26
⋅
CYBER GEEKS All Things Infosec
⋅
HOW to Analyze Linux Malware - A Case Study of Symbiote Symbiote |
| 2022-07-26
⋅
splunk
⋅
ML Detection of Risky Command Exploit |
| 2022-07-26
⋅
Yoroi
⋅
On the FootSteps of Hive Ransomware Hive Hive |
| 2022-07-26
⋅
Cyber Geeks
⋅
How To Analyze Linux Malware – A Case Study Of Symbiote Symbiote |