Click here to download all references as Bib-File.•
2022-03-19
⋅
Chuongdong blog
⋅
LockBit Ransomware v2.0 LockBit |
2022-03-19
⋅
Bleeping Computer
⋅
New Phishing toolkit lets anyone create fake Chrome browser windows |
2022-03-18
⋅
eSentire
⋅
Analysis of Leaked Conti Intrusion Procedures by eSentire’s Threat Response Unit (TRU) Conti Conti |
2022-03-18
⋅
Trend Micro
⋅
Ransomware Spotlight: Hive Hive Hive |
2022-03-18
⋅
Malwarebytes
⋅
Double header: IsaacWiper and CaddyWiper CaddyWiper IsaacWiper |
2022-03-18
⋅
Avast
⋅
Mēris and TrickBot standing on the shoulders of giants Glupteba Proxy Glupteba TrickBot |
2022-03-18
⋅
Vice Motherboard
⋅
Open Source Maintainer Sabotages Code to Wipe Russian, Belarusian Computers PeaceNotWar |
2022-03-18
⋅
The Register
⋅
Cyclops Blink malware sets up shop in ASUS routers CyclopsBlink |
2022-03-18
⋅
RiskIQ
⋅
RiskIQ: Fraudulent Website Attempts to Collect Donations in Support of Ukraine Humanitarian Fund (UHF) |
2022-03-18
⋅
Recorded Future
⋅
Ghostwriter in the Shell: Expanding on Mandiant’s Attribution of UNC1151 to Belarus |
2022-03-17
⋅
⋅
Cert-UA
⋅
UAC-0020 (Vermin) cyberattack on Ukrainian state organizations using the SPECTR malware (CERT-UA#4207) |
2022-03-17
⋅
Google
⋅
Exposing initial access broker with ties to Conti BazarBackdoor BumbleBee Conti EXOTIC LILY |
2022-03-17
⋅
CISA
⋅
Alert (AA22-076A) Strengthening Cybersecurity of SATCOM Network Providers and Customers |
2022-03-17
⋅
IC3
⋅
Indicators of Compromise Associated with AvosLocker Ransomware Avoslocker AvosLocker |
2022-03-17
⋅
Seguranca Informatica
⋅
Rook ransomware analysis Rook |
2022-03-17
⋅
Digital Shadows
⋅
Meet Lapsus$: An Unusual Group in the Cyber Extortion Business |
2022-03-17
⋅
Trend Micro
⋅
Navigating New Frontiers Trend Micro 2021 Annual Cybersecurity Report REvil BazarBackdoor Buer IcedID QakBot REvil |
2022-03-17
⋅
Github (eln0ty)
⋅
IcedID Analysis IcedID |
2022-03-17
⋅
NioGuard
⋅
Analysis of CaddyWiper CaddyWiper |
2022-03-17
⋅
Bleeping Computer
⋅
New Unix rootkit used to steal ATM banking data |