Click here to download all references as Bib-File.•
2022-03-21
⋅
SentinelOne
⋅
The Art and Science of macOS Malware Hunting with radare2 | Leveraging Xrefs, YARA and Zignatures AbstractEmu Vigram |
2022-03-21
⋅
COMPASS SECURITY
⋅
VPN Appliance Forensics LockBit |
2022-03-21
⋅
Bleeping Computer
⋅
Serpent malware campaign abuses Chocolatey Windows package manager Serpent |
2022-03-21
⋅
Threat Post
⋅
Conti Ransomware V. 3, Including Decryptor, Leaked Cobalt Strike Conti TrickBot |
2022-03-21
⋅
Bleeping Computer
⋅
BitRAT malware now spreading as a Windows 10 license activator BitRAT |
2022-03-21
⋅
Threat Post
⋅
Facestealer Trojan Hidden in Google Play Plunders Facebook Accounts FaceStealer |
2022-03-21
⋅
Info Security
⋅
Emotet Is Back and Is Deadlier Than Ever! A Rundown of the Emotet Malware Emotet |
2022-03-21
⋅
VinCSS
⋅
[QuickNote] Analysis of Pandora ransomware Pandora |
2022-03-21
⋅
Proofpoint
⋅
Serpent, No Swiping! New Backdoor Targets French Entities with Unique Attack Chain Serpent |
2022-03-21
⋅
The DFIR Report
⋅
APT35 Automates Initial Access Using ProxyShell |
2022-03-21
⋅
Azure DevOps (Mastadamus)
⋅
Anatomy of An Mirai Botnet Attack Mirai |
2022-03-19
⋅
vsquare
⋅
Behind the hack-and-leak scandal in Poland (UNC1151) |
2022-03-19
⋅
Chuongdong blog
⋅
LockBit Ransomware v2.0 LockBit |
2022-03-19
⋅
Bleeping Computer
⋅
New Phishing toolkit lets anyone create fake Chrome browser windows |
2022-03-18
⋅
eSentire
⋅
Analysis of Leaked Conti Intrusion Procedures by eSentire’s Threat Response Unit (TRU) Conti Conti |
2022-03-18
⋅
Trend Micro
⋅
Ransomware Spotlight: Hive Hive Hive |
2022-03-18
⋅
Malwarebytes
⋅
Double header: IsaacWiper and CaddyWiper CaddyWiper IsaacWiper |
2022-03-18
⋅
Avast
⋅
Mēris and TrickBot standing on the shoulders of giants Glupteba Proxy Glupteba TrickBot |
2022-03-18
⋅
Vice Motherboard
⋅
Open Source Maintainer Sabotages Code to Wipe Russian, Belarusian Computers PeaceNotWar |
2022-03-18
⋅
The Register
⋅
Cyclops Blink malware sets up shop in ASUS routers CyclopsBlink |