Click here to download all references as Bib-File.•
2021-11-16
⋅
Wired
⋅
‘Ghostwriter’ Looks Like a Purely Russian Op - Except It's Not |
2021-11-16
⋅
Cisco
⋅
Attackers use domain fronting technique to target Myanmar with Cobalt Strike Cobalt Strike |
2021-11-16
⋅
Microsoft
⋅
Evolving trends in Iranian threat actor activity – MSTIC presentation at CyberWarCon 2021 |
2021-11-16
⋅
vmware
⋅
Monitoring Winnti 4.0 C2 Servers for Two Years Winnti |
2021-11-16
⋅
Malwarebytes
⋅
TrickBot helps Emotet come back from the dead Emotet TrickBot |
2021-11-15
⋅
Trend Micro
⋅
Groups Target Alibaba ECS Instances for Cryptojacking |
2021-11-15
⋅
binarly
⋅
Design issues of modern EDRs: bypassing ETW-based solutions ESPecter FinFisher RAT |
2021-11-15
⋅
SUCURI
⋅
Fake Ransomware Infection Spooks Website Owners |
2021-11-15
⋅
Bleeping Computer
⋅
Emotet malware is back and rebuilding its botnet via TrickBot Emotet |
2021-11-15
⋅
SentinelOne
⋅
Infect If Needed | A Deeper Dive Into Targeted Backdoor macOS.Macma CDDS |
2021-11-15
⋅
The DFIR Report
⋅
Exchange Exploit Leads to Domain Wide Ransomware |
2021-11-15
⋅
Check Point Research
⋅
Uncovering MosesStaff techniques: Ideology over Money DCSrv MosesStaff |
2021-11-15
⋅
Recorded Future
⋅
Ransomware - Understand. Prevent. Recover. |
2021-11-15
⋅
Malwarebytes
⋅
Evasive maneuvers: HTML smuggling explained |
2021-11-15
⋅
TRUESEC
⋅
ProxyShell, QBot, and Conti Ransomware Combined in a Series of Cyberattacks Cobalt Strike Conti QakBot |
2021-11-15
⋅
cyber.wtf blog
⋅
Guess who’s back Emotet |
2021-11-14
⋅
Github (gabrielcurrie)
⋅
Ready for (nearly) anything: Five things to prepare for a cyber security incident |
2021-11-14
⋅
Twitter (@f0wlsec)
⋅
A static config extractor for the main component of DanaBot DanaBot |
2021-11-13
⋅
ZAYOTEM
⋅
Alien Technical Analysis Report Alien |
2021-11-13
⋅
YouTube (AGDC Services)
⋅
Automate Qbot Malware String Decryption With Ghidra Script QakBot |