Click here to download all references as Bib-File.•
2024-05-08
⋅
Medium (montysecurity)
⋅
From OSINT to Disk: Wave Stealer Analysis Wave Stealer |
2024-05-08
⋅
Elastic
⋅
Elastic Security - WarmCookie YARA Rule WarmCookie |
2024-05-08
⋅
CERT.PL
⋅
APT28 campaign targeting Polish government institutions Headlace |
2024-05-07
⋅
Elastic
⋅
Elastic Security - GhostEngine YARA Rule win.ghostengine |
2024-05-07
⋅
Twitter (@fs0c131y)
⋅
Tweets on LockBitSupp LockBit |
2024-05-07
⋅
KrebsOnSecurity
⋅
U.S. Charges Russian Man as Boss of LockBit Ransomware Group LockBit |
2024-05-07
⋅
AhnLab
⋅
LNK File Disguised as Certificate Distributing RokRAT Malware RokRAT |
2024-05-07
⋅
⋅
Gatewatcher
⋅
Cybercrime's Anatomy Threats to the Healthcare World |
2024-05-06
⋅
Zscaler
⋅
HijackLoader Updates HijackLoader |
2024-05-06
⋅
Cyber-Forensics
⋅
Agent Tesla Malware Analysis Agent Tesla |
2024-05-05
⋅
Github (VenzoV)
⋅
Latrodectus "littlehw" Latrodectus |
2024-05-04
⋅
Risk Associates
⋅
191 Australian Organizations affected by ZircoDATA Breach Linked to Russian Ransomware Gang |
2024-05-04
⋅
Medium MITRE-Engenuity
⋅
Technical Deep Dive: Understanding the Anatomy of a Cyber Intrusion WIREFIRE |
2024-05-03
⋅
Aqua Nautilus
⋅
Kinsing Demystified: A Comprehensive Technical Guide Kinsing |
2024-05-03
⋅
Elastic
⋅
Dissecting REMCOS RAT: An in- depth analysis of a widespread 2024 malware, Part Three Remcos |
2024-05-02
⋅
calif.io
⋅
Dissecting LOCKBIT v3 ransomware LockBit |
2024-05-01
⋅
⋅
Macnica
⋅
The Reality of Targeted Attacks and Countermeasures: Trends in Cyber Espionage (Targeted Attacks) Targeting Japan FY2023 LODEINFO NOOPDOOR |
2024-05-01
⋅
Microsoft
⋅
“Dirty stream” attack: Discovering and mitigating a common vulnerability pattern in Android apps |
2024-05-01
⋅
Natto Thoughts
⋅
Ransom-War: Russian Extortion Operations as Hybrid Warfare, Part One Clop Conti Maze TrickBot |
2024-05-01
⋅
Trend Micro
⋅
Router Roulette: Cybercriminals and Nation-States Sharing Compromised Networks SSHDoor |