Click here to download all references as Bib-File.•
2022-04-04
⋅
Mandiant
⋅
FIN7 Power Hour: Adversary Archaeology and the Evolution of FIN7 Griffon BABYMETAL Carbanak Cobalt Strike JSSLoader Termite |
2022-04-04
⋅
Cloudsek
⋅
Detailed Analysis of LAPSUS$ Cybercriminal Group that has Compromised Nvidia, Microsoft, Okta, and Globant |
2022-04-04
⋅
⋅
Cert-UA
⋅
Cyber attack of UAC-0010 group (Armageddon) on state organizations of Ukraine (CERT-UA # 4378) Gamaredon Group |
2022-04-04
⋅
⋅
LAC WATCH
⋅
Confirmation of damage to domestic e-commerce sites, actual situation of Web skimming attacks and examples of countermeasures that Rack thinks (Water Pamola) FAKEUPDATES |
2022-04-04
⋅
Trend Micro
⋅
Ransomware Spotlight: AvosLocker AvosLocker |
2022-04-04
⋅
Dragos
⋅
European Industrial Infrastructure Cyber Threat Perspective |
2022-04-04
⋅
Intezer
⋅
Elephant Framework Delivered in Phishing Attacks Against Ukrainian Organizations GraphSteel GrimPlant SaintBear |
2022-04-04
⋅
Medium (csg-govtech)
⋅
Uncommon office malware stagers |
2022-04-04
⋅
Bankinfo Security
⋅
The Ransomware Files, Episode 6: Kaseya and REvil REvil |
2022-04-04
⋅
Cyber Security News
⋅
AcidRain Wiper Malware hit Routers and Modems, Haults Communication AcidRain |
2022-04-04
⋅
The Hacker News
⋅
Experts Shed Light on BlackGuard Infostealer Malware Sold on Russian Hacking Forums BlackGuard |
2022-04-04
⋅
Bill Demirkapi's Blog
⋅
Sharing is Caring: Abusing Shared Sections for Code Injection |
2022-04-04
⋅
Kaspersky
⋅
Spring4Shell (CVE-2022-22965): details and mitigations |
2022-04-04
⋅
The DFIR Report
⋅
Stolen Images Campaign Ends in Conti Ransomware Conti IcedID |
2022-04-03
⋅
YouTube (0xca7)
⋅
Powershell Script Deobfuscation |
2022-04-03
⋅
Bleeping Computer
⋅
New Borat remote access malware is no laughing matter Borat RAT |
2022-04-02
⋅
⋅
Dr.Web
⋅
Study of targeted attacks on Russian research institutes Logtu |
2022-04-02
⋅
Github (pl-v)
⋅
Emotet Analysis Part 1: Unpacking Emotet |
2022-04-02
⋅
Github (cocomelonc)
⋅
Malware development tricks. Find kernel32.dll base: asm style. C++ example. Conti |
2022-04-02
⋅
GovInfo Security
⋅
Cyber Espionage Actor Deploying Malware Using Excel GraphSteel GrimPlant |