Click here to download all references as Bib-File.•
2021-07-29
⋅
Recorded Future
⋅
“Beijing One Pass” Employee Benefits Software Exhibits Spyware Characteristics |
2021-07-29
⋅
360 Total Security
⋅
“Netfilter Rootkit II ” Continues to Hold WHQL Signatures NetfilterRootkit |
2021-07-29
⋅
ENISA
⋅
ENISA Threat Landscape for Supply Chain Attacks |
2021-07-29
⋅
Rasta Mouse
⋅
NTLM Relaying via Cobalt Strike Cobalt Strike |
2021-07-28
⋅
Threatpost
⋅
BlackMatter & Haron: Evil Ransomware Newborns or Rebirths Haron Ransomware |
2021-07-28
⋅
Malwarebytes
⋅
Crimea “manifesto” deploys VBA Rat using double attack vectors |
2021-07-28
⋅
Corelight
⋅
Telegram Zeek, you’re my main notice |
2021-07-28
⋅
RiskIQ
⋅
Use of XAMPP Web Component to Identify Agent Tesla Infrastructure Agent Tesla |
2021-07-28
⋅
KELA
⋅
New Russian-Speaking Forum – A New Place for RaaS? Babuk |
2021-07-28
⋅
McAfee
⋅
Babuk: Moving to VM and *nix Systems Before Stepping Away Babuk |
2021-07-28
⋅
CISA
⋅
Top Routinely Exploited Vulnerabilities |
2021-07-28
⋅
Proofpoint
⋅
I Knew You Were Trouble: TA456 Targets Defense Contractor with Alluring Social Media Persona Liderc SysKit |
2021-07-27
⋅
Bitdefender
⋅
Deep dive into a FIN8 attack – A forensic investigation |
2021-07-27
⋅
ZAYOTEM
⋅
Diamondfox Technical Analysis Report DiamondFox |
2021-07-27
⋅
ZAYOTEM
⋅
DarkSide Ransomware Technical Analysis Report DarkSide |
2021-07-27
⋅
ZAYOTEM
⋅
Oski Stealer Technical Analysis Report Oski Stealer |
2021-07-27
⋅
Flashpoint
⋅
Chatter Indicates BlackMatter as REvil Successor REvil |
2021-07-27
⋅
Youtube (SANS Institute)
⋅
SANS Threat Analysis Rundown - Kaseya VSA attack REvil |
2021-07-27
⋅
Gigamon
⋅
Ghosts on the Wire: Expanding Conceptions of Network Anomalies SUNBURST |
2021-07-27
⋅
Recorded Future
⋅
China’s Digital Colonialism: Espionage and Repression Along the Digital Silk Road |