Click here to download all references as Bib-File.•
2022-04-04
⋅
Dragos
⋅
European Industrial Infrastructure Cyber Threat Perspective |
2022-04-04
⋅
Intezer
⋅
Elephant Framework Delivered in Phishing Attacks Against Ukrainian Organizations GraphSteel GrimPlant SaintBear |
2022-04-04
⋅
Medium (csg-govtech)
⋅
Uncommon office malware stagers |
2022-04-04
⋅
Bankinfo Security
⋅
The Ransomware Files, Episode 6: Kaseya and REvil REvil |
2022-04-04
⋅
Cyber Security News
⋅
AcidRain Wiper Malware hit Routers and Modems, Haults Communication AcidRain |
2022-04-04
⋅
The Hacker News
⋅
Experts Shed Light on BlackGuard Infostealer Malware Sold on Russian Hacking Forums BlackGuard |
2022-04-04
⋅
Bill Demirkapi's Blog
⋅
Sharing is Caring: Abusing Shared Sections for Code Injection |
2022-04-04
⋅
Kaspersky
⋅
Spring4Shell (CVE-2022-22965): details and mitigations |
2022-04-04
⋅
The DFIR Report
⋅
Stolen Images Campaign Ends in Conti Ransomware Conti IcedID |
2022-04-03
⋅
YouTube (0xca7)
⋅
Powershell Script Deobfuscation |
2022-04-03
⋅
Bleeping Computer
⋅
New Borat remote access malware is no laughing matter Borat RAT |
2022-04-02
⋅
⋅
Dr.Web
⋅
Study of targeted attacks on Russian research institutes Logtu |
2022-04-02
⋅
Github (pl-v)
⋅
Emotet Analysis Part 1: Unpacking Emotet |
2022-04-02
⋅
Github (cocomelonc)
⋅
Malware development tricks. Find kernel32.dll base: asm style. C++ example. Conti |
2022-04-02
⋅
GovInfo Security
⋅
Cyber Espionage Actor Deploying Malware Using Excel GraphSteel GrimPlant |
2022-04-02
⋅
⋅
institute for advanced threats
⋅
WAVES LURKING IN THE CALM OF THE WIND AND WAVES: A DYNAMIC ANALYSIS OF THE ATTACK ACTIVITIES OF THE APT-C-00 (SEALOTUS) ORGANIZATION |
2022-04-01
⋅
Lab52
⋅
Complete dissection of an APK with a suspicious C2 Server |
2022-04-01
⋅
Twitter (@3xp0rtblog)
⋅
Tweet on 000stealer, written in GO and its panel 000Stealer |
2022-04-01
⋅
Kaspersky
⋅
The State of Stalkerware in 2021 Cerberus |
2022-04-01
⋅
Medium s2wlab
⋅
Rising Stealer in Q1 2022: BlackGuard Stealer BlackGuard |