Click here to download all references as Bib-File.•
| 2022-04-05
⋅
Intel 471
⋅
Move fast and commit crimes: Conti’s development teams mirror corporate tech BazarBackdoor TrickBot |
| 2022-04-01
⋅
splunk
⋅
Threat Update: CaddyWiper CaddyWiper |
| 2022-03-31
⋅
Blackberry
⋅
Threat Thursday: Malicious Macros Still Causing Chaos |
| 2022-03-31
⋅
nccgroup
⋅
Conti-nuation: methods and techniques observed in operations post the leaks Cobalt Strike Conti QakBot |
| 2022-03-30
⋅
CrowdStrike
⋅
Who is EMBER BEAR? WhisperGate |
| 2022-03-30
⋅
ASEC
⋅
Malicious Word File Targeting Corporate Users Being Distributed |
| 2022-03-29
⋅
⋅
ASEC
⋅
APT Attack Impersonating Defector Resume Form (VBS SCRIPT) |
| 2022-03-29
⋅
Symantec
⋅
Verblecon: Sophisticated New Loader Used in Low-level Attacks Verblecon |
| 2022-03-28
⋅
Avast
⋅
Avast Finds Compromised Philippine Navy Certificate Used in Remote Access Tool Unidentified 091 |
| 2022-03-28
⋅
splunk
⋅
Threat Update DoubleZero Destructor DoubleZero |
| 2022-03-24
⋅
Blackberry
⋅
Threat Thursday: SunSeed Malware Targets Ukraine Refugee Aid Efforts SunSeed |
| 2022-03-23
⋅
Secureworks
⋅
GOLD ULRICK Leaks Reveal Organizational Structure and Relationships Conti Emotet IcedID TrickBot |
| 2022-03-23
⋅
Secureworks
⋅
Threat Intelligence Executive Report Volume 2022, Number 2 Conti Emotet IcedID TrickBot |
| 2022-03-23
⋅
CrowdStrike
⋅
Falcon OverWatch Threat Hunting Contributes to Seamless Protection Against Novel BlackCat Attack BlackCat |
| 2022-03-23
⋅
Team Cymru
⋅
Raccoon Stealer – An Insight into Victim “Gates” Raccoon |
| 2022-03-23
⋅
⋅
Qianxin
⋅
Analysis of Attack Activity of PROMETHIUM Disguised StrongPity |
| 2022-03-22
⋅
Microsoft
⋅
DEV-0537 (UNC3661) criminal actor targeting organizations for data exfiltration and destruction RedLine Stealer LAPSUS |
| 2022-03-21
⋅
AhnLab
⋅
BitRAT Disguised as Windows Product Key Verification Tool Being Distributed BitRAT TinyNuke |
| 2022-03-18
⋅
Malwarebytes
⋅
Double header: IsaacWiper and CaddyWiper CaddyWiper IsaacWiper |
| 2022-03-17
⋅
Digital Shadows
⋅
Meet Lapsus$: An Unusual Group in the Cyber Extortion Business |