Click here to download all references as Bib-File.•
2022-03-23
⋅
Secureworks
⋅
Threat Intelligence Executive Report Volume 2022, Number 2 Conti Emotet IcedID TrickBot |
2022-03-23
⋅
Morphisec
⋅
New JSSLoader Trojan Delivered Through XLL Files JSSLoader |
2022-03-23
⋅
splunk
⋅
Gone in 52 Seconds…and 42 Minutes: A Comparative Analysis of Ransomware Encryption Speed Avaddon Babuk BlackMatter Conti DarkSide LockBit Maze Mespinoza REvil Ryuk |
2022-03-23
⋅
CrowdStrike
⋅
Falcon OverWatch Threat Hunting Contributes to Seamless Protection Against Novel BlackCat Attack BlackCat |
2022-03-23
⋅
SecurityAffairs
⋅
It’s official, Lapsus$ gang compromised a Microsoft employee’s account RedLine Stealer |
2022-03-23
⋅
Security Boulevard
⋅
Midas Ransomware : Tracing the Evolution of Thanos Ransomware Variants Hakbit Midas |
2022-03-23
⋅
Team Cymru
⋅
Raccoon Stealer – An Insight into Victim “Gates” Raccoon |
2022-03-23
⋅
Zscaler
⋅
Midas Ransomware : Tracing the Evolution of Thanos Ransomware Variants Hakbit Midas |
2022-03-23
⋅
Fortinet
⋅
Bad Actors Trying to Capitalize on Current Events via Shameless Email Scams Emotet |
2022-03-23
⋅
Fortinet
⋅
MS Office Files Involved Again in Recent Emotet Trojan Campaign – Part II Emotet |
2022-03-23
⋅
BleepingComputer
⋅
New Mustang Panda hacking campaign targets diplomats, ISPs PlugX |
2022-03-23
⋅
⋅
Qianxin
⋅
Analysis of Attack Activity of PROMETHIUM Disguised StrongPity |
2022-03-23
⋅
InfoSec Handlers Diary Blog
⋅
Arkei Variants: From Vidar to Mars Stealer Arkei Stealer Mars Stealer Vidar |
2022-03-23
⋅
ESET Research
⋅
Mustang Panda’s Hodur: Old tricks, new Korplug variant Hodur PlugX |
2022-03-23
⋅
MSSPAlert
⋅
LokiLocker Ransomware May Use False Flag to Avoid Identification LokiLocker |
2022-03-23
⋅
KrebsOnSecurity
⋅
A Closer Look at the LAPSUS$ Data Extortion Group RedLine Stealer |
2022-03-23
⋅
NVISO Labs
⋅
Hunting Emotet campaigns with Kusto Emotet |
2022-03-23
⋅
Intel 471
⋅
Conti puts the ‘organized’ in organized crime Conti |
2022-03-22
⋅
JPCERT/CC
⋅
JSAC 2022 -Day 1- |
2022-03-22
⋅
Microsoft
⋅
DEV-0537 criminal actor targeting organizations for data exfiltration and destruction LAPSUS |