Click here to download all references as Bib-File.•
| 2021-05-03
⋅
Bleeping Computer
⋅
N3TW0RM ransomware emerges in wave of cyberattacks in Israel |
| 2021-05-03
⋅
Fortinet
⋅
Spearphishing Attack Uses COVID-21 Lure to Target Ukrainian Government |
| 2021-05-03
⋅
Medium walmartglobaltech
⋅
BuerLoader Updates Buer |
| 2021-05-03
⋅
Proofpoint
⋅
New Variant of Buer Loader Written in Rust Buer |
| 2021-05-02
⋅
The Record
⋅
DOJ hiring new liaison prosecutor to hunt cybercriminals in Eastern Europe |
| 2021-05-01
⋅
ClearSky
⋅
Attributing Attacks Against Crypto Exchanges to LAZARUS – North Korea CageyChameleon |
| 2021-05-01
⋅
Marco Ramilli's Blog
⋅
Muddywater: Binder Project |
| 2021-04-30
⋅
Medium ateixei
⋅
Detecting network beacons via KQL using simple spread stats functions |
| 2021-04-30
⋅
Cybleinc
⋅
Transparent Tribe Operating with a New Variant of Crimson RAT Crimson RAT |
| 2021-04-30
⋅
Flashpoint
⋅
A Second Iranian State-Sponsored Ransomware Operation “Project Signal” Emerges |
| 2021-04-30
⋅
The Record
⋅
Cybercrime Featured DarkPath scam group loses 134 domains impersonating the WHO |
| 2021-04-29
⋅
Silent Push
⋅
Information Gathering as a Researcher: a use case |
| 2021-04-29
⋅
FireEye
⋅
UNC2447 SOMBRAT and FIVEHANDS Ransomware: A Sophisticated Financial Threat Cobalt Strike FiveHands HelloKitty |
| 2021-04-29
⋅
SecurityWeek
⋅
Chinese Cyberspies Target Military Organizations in Asia With New Malware Nebulae |
| 2021-04-29
⋅
NTT
⋅
The Operations of Winnti group Cobalt Strike ShadowPad Spyder Winnti Earth Lusca |
| 2021-04-29
⋅
Palo Alto Networks Unit 42
⋅
New Shameless Commodity Cryptocurrency Stealer (WeSteal) and Commodity RAT (WeControl) WeControl WeSteal |
| 2021-04-29
⋅
Bleeping Computer
⋅
Whistler resort municipality hit by new ransomware operation |
| 2021-04-29
⋅
DomainTools
⋅
DomainTools And Digital Archeology: A Look At RotaJakiro RotaJakiro |
| 2021-04-29
⋅
Lab52
⋅
Chimera APT updates on its OwlProxy malware Owlproxy |
| 2021-04-29
⋅
360 netlab
⋅
Threat Alert: New update from Sysrv-hello, now infecting victims‘ webpages to push malicious exe to end users |