Click here to download all references as Bib-File.•
2021-05-06
⋅
xorl %eax, %eax
⋅
Iran Cyber Operations Groups Cleaver |
2021-05-06
⋅
Kaspersky
⋅
Operation TunnelSnake Moriya TunnelSnake |
2021-05-06
⋅
MIT Technology Review
⋅
How China turned a prize-winning iPhone hack against the Uyghurs |
2021-05-05
⋅
Symantec
⋅
Multi-Factor Authentication: Headache for Cyber Actors Inspires New Attack Techniques CHINACHOPPER |
2021-05-05
⋅
RiskIQ
⋅
Viruses to Violations - TrickBot's Shift in Tactics During the Pandemic TrickBot |
2021-05-05
⋅
ThreatFabric
⋅
Smishing campaign in NL spreading Cabassous and Anatsa Anatsa |
2021-05-05
⋅
TRUESEC
⋅
Are The Notorious Cyber Criminals Evil Corp actually Russian Spies? Cobalt Strike Hades WastedLocker |
2021-05-05
⋅
Zscaler
⋅
Catching RATs Over Custom Protocols Analysis of top non-HTTP/S threats Agent Tesla AsyncRAT Crimson RAT CyberGate Ghost RAT Nanocore RAT NetWire RC NjRAT Quasar RAT Remcos |
2021-05-05
⋅
Recorded Future
⋅
China’s PLA Unit 61419 Purchasing Foreign Antivirus Products, Likely for Exploitation |
2021-05-05
⋅
zimperium
⋅
Flubot vs. Zimperium FluBot |
2021-05-05
⋅
ESET Research
⋅
Ousaban: Private photo collection hidden in a CABinet Ousaban |
2021-05-05
⋅
The Record
⋅
Malware group leaks millions of stolen authentication cookies Raccoon |
2021-05-05
⋅
SophosLabs Uncut
⋅
Intervention halts a ProxyLogon-enabled attack Cobalt Strike |
2021-05-04
⋅
Red Canary
⋅
Transferring leverage in a ransomware attack |
2021-05-04
⋅
in.security
⋅
Detecting Lateral Movement via WinRM Using KQL |
2021-05-04
⋅
Seguranca Informatica
⋅
A taste of the latest release of QakBot QakBot |
2021-05-04
⋅
Twitter (@TrendMicroRSRCH)
⋅
Tweet on N3tw0rm ransomware, that has started affecting users in Israel. Pay2Key |
2021-05-04
⋅
Trustwave
⋅
Pingback: Backdoor At The End Of The ICMP Tunnel PingBack |
2021-05-03
⋅
Rewterz Information Security
⋅
Rewterz Threat Alert – Financially Motivated Aggressive Group Carrying Out Ransomware Campaigns – Active IOCs FiveHands SombRAT UNC2447 |
2021-05-03
⋅
xorl %eax, %eax
⋅
Exploitation of data breaches for executive protection |