Click here to download all references as Bib-File.•
2021-06-10
⋅
ZAYOTEM
⋅
NetWire Technical Analysis Report NetWire RC |
2021-06-10
⋅
ZAYOTEM
⋅
QakBot Technical Analysis Report QakBot |
2021-06-10
⋅
ZAYOTEM
⋅
SmokeLoader Technical Analysis Report SmokeLoader |
2021-06-10
⋅
ZAYOTEM
⋅
LokiBot Technical Analysis Report LokiBot |
2021-06-10
⋅
HUNT & HACKETT
⋅
REvil: the usage of legitimate remote admin tooling REvil |
2021-06-10
⋅
lacework
⋅
Keksec & Tsunami-Ryuk N3Cr0m0rPh |
2021-06-10
⋅
Group-IB
⋅
Big airline heist APT41 likely behind massive supply chain attack Cobalt Strike |
2021-06-09
⋅
The Record
⋅
Russian hackers breached Dutch police systems in 2017 |
2021-06-09
⋅
Twitter (@SecurityJoes)
⋅
Tweet on .NET builder of a Ryuk imposter malware Ryuk |
2021-06-09
⋅
Palo Alto Networks Unit 42
⋅
Prometheus Ransomware Gang: A Group of REvil? Hakbit Prometheus REvil |
2021-06-08
⋅
Gdata
⋅
Picture this: Malware Hides in Steam Profile Images SteamHide |
2021-06-08
⋅
Sentinel LABS
⋅
ThunderCats Hack the FSB | Your Taxes Didn’t Pay For This Op Mail-O Tmanger TA428 |
2021-06-08
⋅
LOKIBOT - A commodity malware Loki Password Stealer (PWS) |
2021-06-08
⋅
Microsoft
⋅
New large-scale campaign targets Kubeflow |
2021-06-08
⋅
Kaspersky
⋅
PuzzleMaker attacks with Chrome zero-day exploit chain Chainshot puzzlemaker |
2021-06-08
⋅
Trend Micro
⋅
Modern Ransomware’s Double Extortion Tactics and How to Protect Enterprises Against Them Nefilim |
2021-06-08
⋅
SentinelOne
⋅
ThunderCats Hack the FSB | Your Taxes Didn’t Pay For This Op Mail-O SManager Tmanger |
2021-06-08
⋅
CrowdStrike
⋅
UAL Thank Us Later: Leveraging User Access Logging for Forensic Investigations |
2021-06-08
⋅
Palo Alto Networks Unit 42
⋅
TeamTNT Using WatchDog TTPs to Expand Its Cryptojacking Footprint |
2021-06-08
⋅
Advanced Intelligence
⋅
From QBot...with REvil Ransomware: Initial Attack Exposure of JBS QakBot REvil |