Click here to download all references as Bib-File.•
2021-05-05
⋅
Kashif Ali Surfeit and Blasé Security
⋅
Roaming Mantis Amplifies Smishing Campaign with OS-Specific Android Malware MoqHao Roaming Mantis |
2021-05-05
⋅
Profero
⋅
Cuba Ransomware Group on a Roll Cuba |
2021-05-04
⋅
in.security
⋅
Detecting Lateral Movement via WinRM Using KQL |
2021-05-03
⋅
Rewterz Information Security
⋅
Rewterz Threat Alert – Financially Motivated Aggressive Group Carrying Out Ransomware Campaigns – Active IOCs FiveHands SombRAT UNC2447 |
2021-04-29
⋅
SecurityWeek
⋅
Chinese Cyberspies Target Military Organizations in Asia With New Malware Nebulae |
2021-04-29
⋅
The Institute for Security and Technology
⋅
Combating Ransomware A Comprehensive Framework for Action: Key Recommendations from the Ransomware Task Force Conti EternalPetya |
2021-04-26
⋅
CISA
⋅
Russian Foreign Intelligence Service (SVR)Cyber Operations: Trends and Best Practices for Network Defenders elf.wellmess WellMess |
2021-04-25
⋅
Nightwatch Cybersecurity
⋅
Supply Chain Attacks via GitHub.com Releases |
2021-04-24
⋅
⋅
Non-offensive security
⋅
Detect Cobalt Strike server through DNS protocol Cobalt Strike |
2021-04-23
⋅
GuidePoint Security
⋅
Mount Locker Ransomware Steps up Counter-IR Capabilities, Hindering Efforts for Detection, Response and Investigation Mount Locker |
2021-04-22
⋅
The Record
⋅
Nightmare week for security vendors: Now a Trend Micro bug is being exploited in the wild |
2021-04-20
⋅
FireEye
⋅
Zero-Day Exploits in SonicWall Email Security Lead to Enterprise Compromise |
2021-04-16
⋅
Medium (Bank Security)
⋅
Are the hackers all Russian? Results of a 1 year espionage operation in the Top-tier Russian underground communities |
2021-04-13
⋅
CAPCOM
⋅
4th Update Regarding Data Security Incident Due to Unauthorized Access:Investigation Results RagnarLocker |
2021-04-12
⋅
PTSecurity
⋅
PaaS, or how hackers evade antivirus software Amadey Bunitu Cerber Dridex ISFB KPOT Stealer Mailto Nemty Phobos Pony Predator The Thief QakBot Raccoon RTM SmokeLoader Zloader |
2021-04-06
⋅
Cado Security
⋅
Threat Group Uses Voice Changing Software in Espionage Attempt Houdini |
2021-04-02
⋅
360 Total Security
⋅
A “txt file” can steal all your secrets Poulight Stealer |
2021-04-01
⋅
humansecurity
⋅
PARETO: A Technical Analysis |
2021-03-31
⋅
Google
⋅
Update on campaign targeting security researchers |
2021-03-31
⋅
Twitter (@ClearskySec)
⋅
Tweet on Adamantium stealer Adamantium Thief |