Click here to download all references as Bib-File.•
2022-07-21
⋅
Sentinel LABS
⋅
LockBit 3.0 Update | Unpicking the Ransomware’s Latest Anti-Analysis and Evasion Techniques LockBit |
2022-07-21
⋅
⋅
ASEC
⋅
Dissemination of AppleSeed to Specific Military Maintenance Companies Appleseed |
2022-07-21
⋅
ASEC
⋅
Malware Being Distributed by Disguising Itself as Icon of V3 Lite Ave Maria |
2022-07-20
⋅
Freebuf
⋅
Abused Slack Service: Analysis of APT29's Attack on Italy Unidentified 098 (APT29 Slack Downloader) |
2022-07-20
⋅
⋅
Qianxin
⋅
The Sidewinder (APT-Q-39) uses Google Play to spread an analysis of malicious Android software SideWinder |
2022-07-20
⋅
NVISO Labs
⋅
Analysis of a trojanized jQuery script: GootLoader unleashed GootLoader Cobalt Strike |
2022-07-19
⋅
⋅
Cert-AgID
⋅
Analysis and technical insights on the Coper malware used to attack mobile devices Coper |
2022-07-13
⋅
Palo Alto Networks Unit 42
⋅
Cobalt Strike Analysis and Tutorial: CS Metadata Encryption and Decryption Cobalt Strike |
2022-07-12
⋅
Team Cymru
⋅
An Analysis of Infrastructure linked to the Hagga Threat Actor Hagga |
2022-07-12
⋅
Cyren
⋅
Example Analysis of Multi-Component Malware Emotet Formbook |
2022-07-12
⋅
Google
⋅
TAG Bulletin: Q2 2022 |
2022-07-12
⋅
Team Cymru
⋅
An Analysis of Infrastructure linked to the Hagga Threat Actor Agent Tesla |
2022-07-12
⋅
Artik Blue
⋅
Malware analysis with IDA/Radare2 - Multiple unpacking (Ramnit worm) Ramnit |
2022-07-09
⋅
Artik Blue
⋅
Malware analysis with IDA/Radare2 - Basic Unpacking (Dridex first stage) Dridex |
2022-07-07
⋅
Cybereason
⋅
THREAT ANALYSIS REPORT: LockBit 2.0 - All Paths Lead to Ransom LockBit |
2022-06-30
⋅
Google
⋅
Countering hack-for-hire groups Void Balaur |
2022-06-29
⋅
Sekoia
⋅
Raccoon Stealer v2 – Part 2: In-depth analysis Raccoon |
2022-06-29
⋅
vmware
⋅
Lateral Movement in the Real World: A Quantitative Analysis |
2022-06-29
⋅
Group-IB
⋅
Fat Cats - An analysis of the BlackCat ransomware affiliate program BlackCat BlackCat |
2022-06-28
⋅
Accenture
⋅
Steal(Bit) or exfil, what does it (Ex)Matter? Comparative Analysis of Custom Exfiltration Tools ExMatter StealBit |