Click here to download all references as Bib-File.•
2022-01-27
⋅
Medium jonahacks
⋅
Malware Analysis —Manual Unpacking of Redaman RTM |
2022-01-27
⋅
Ransomware as a Service Innovation Curve Conti LockBit |
2022-01-27
⋅
Recorded Future
⋅
Russia’s Biggest Threat Is Its Instability WhisperGate |
2022-01-27
⋅
Akamai
⋅
UPnProxy: Eternal Silence |
2022-01-27
⋅
⋅
Threat Lab Indonesia
⋅
Malware Analysis Emotet Infection Emotet |
2022-01-27
⋅
splunk
⋅
Threat Advisory: STRT-TA02 - Destructive Software WhisperGate |
2022-01-27
⋅
Gigamon
⋅
Focusing on “Left of Boom” WhisperGate |
2022-01-27
⋅
Blackberry
⋅
Threat Thursday: WhisperGate Wiper Targets Government, Non-profit, and IT Organizations in Ukraine WhisperGate |
2022-01-27
⋅
SCYTHE
⋅
Adversary Emulation Diavol Ransomware #ThreatThursday Diavol |
2022-01-27
⋅
vmware
⋅
BlackSun Ransomware – The Dark Side of PowerShell BlackSun |
2022-01-27
⋅
CrowdStrike
⋅
New Docker Cryptojacking Attempts Detected Over 2021 End-of-Year Holidays |
2022-01-27
⋅
Palo Alto Networks Unit 42
⋅
Threat Assessment: BlackCat Ransomware BlackCat |
2022-01-27
⋅
K7 Security
⋅
Facestealer – The Rise of Facebook Credential Stealer Malware FaceStealer |
2022-01-27
⋅
PWC
⋅
Threat actor of in-Tur-est Cameleon |
2022-01-27
⋅
ANALYST1
⋅
A History of Revil REvil REvil |
2022-01-27
⋅
splunk
⋅
Threat Advisory: STRT-TA02 - Destructive Software WhisperGate |
2022-01-27
⋅
forensicitguy
⋅
GuLoader Executing Shellcode Using Callback Functions CloudEyE |
2022-01-27
⋅
CrowdStrike
⋅
Programs Hacking Programs: How to Extract Memory Information to Spot Linux Malware |
2022-01-27
⋅
BleepingComputer
⋅
Taiwanese Apple and Tesla contractor hit by Conti ransomware Conti |
2022-01-27
⋅
CrowdStrike
⋅
Early Bird Catches the Wormhole: Observations from the StellarParticle Campaign GoldMax |