Click here to download all references as Bib-File.•
| 2022-05-31
⋅
NOZOMI Network Labs
⋅
Industroyer vs. Industroyer2: Evolution of the IEC 104 Component INDUSTROYER2 |
| 2022-05-31
⋅
Thales
⋅
Cyber Threat Handbook 2002 GOBLIN PANDA Thrip |
| 2022-05-31
⋅
Cyfirma
⋅
Yashma Ransomware Report |
| 2022-05-31
⋅
Uptycs
⋅
WarzoneRAT Can Now Evade Detection With Process Hollowing Ave Maria |
| 2022-05-31
⋅
Malwarology
⋅
Janicab Series: Attibution and IoCs Janicab |
| 2022-05-31
⋅
Check Point Research
⋅
XLoader Botnet: Find Me If You Can Xloader |
| 2022-05-30
⋅
⋅
NSFOCUS
⋅
Operation DarkCasino: In-Depth Analysis of Recent Attacks by APT Group EVILNUM DarkMe |
| 2022-05-30
⋅
Automatically Unpacking IcedID Stage 1 with Angr IcedID |
| 2022-05-28
⋅
Bleeping Computer
⋅
Clop ransomware gang is back, hits 21 victims in a single month Clop |
| 2022-05-27
⋅
Kroll
⋅
Emotet Analysis: New LNKs in the Infection Chain – The Monitor, Issue 20 Emotet |
| 2022-05-27
⋅
0ffset Blog
⋅
BAZARLOADER: Analysing The Main Loader BazarBackdoor |
| 2022-05-27
⋅
Malwarology
⋅
Janicab Series: The Core Artifact Janicab |
| 2022-05-27
⋅
⋅
PTSecurity
⋅
How bootkits are implemented in modern firmware and how UEFI differs from Legacy BIOS LoJax MoonBounce |
| 2022-05-26
⋅
Darktrace
⋅
Worm-like propagation of Sysrv-hello crypto-jacking botnet: Network traffic analysis and latest TTPs Sysrv-hello Sysrv-hello |
| 2022-05-26
⋅
Trustwave
⋅
Grandoreiro Banking Malware Resurfaces for Tax Season Grandoreiro |
| 2022-05-26
⋅
IBM
⋅
Black Basta Besting Your Network? Black Basta |
| 2022-05-26
⋅
AT&T Cybersecurity
⋅
Rapidly evolving IoT malware EnemyBot now targeting Content Management System servers and Android devices EnemyBot |
| 2022-05-26
⋅
Malwarology
⋅
Janicab Series: Further Steps in the Infection Chain Janicab |
| 2022-05-25
⋅
Logpoint
⋅
Buzz of the Bumblebee – A new malicious loader BumbleBee |
| 2022-05-25
⋅
Medium walmartglobaltech
⋅
SocGholish Campaigns and Initial Access Kit FAKEUPDATES Blister Cobalt Strike NetSupportManager RAT |