Click here to download all references as Bib-File.•
2021-06-02
⋅
Sophos
⋅
AMSI bypasses remain tricks of the malware trade Agent Tesla Cobalt Strike Meterpreter |
2021-06-02
⋅
Bleeping Computer
⋅
FUJIFILM shuts down network after suspected ransomware attack QakBot |
2021-06-02
⋅
Bleeping Computer
⋅
FBI: REvil cybergang behind the JBS ransomware attack REvil |
2021-06-02
⋅
Medium CyCraft
⋅
China-Linked Threat Group Targets Taiwan Critical Infrastructure, Smokescreen Ransomware Cobalt Strike ColdLock |
2021-06-02
⋅
Check Point Research
⋅
SharpPanda: Chinese APT Group Targets Southeast Asian Government With Previously Unknown Backdoor SharpPanda |
2021-06-01
⋅
Dark Vortex
⋅
PE Reflection: The King is Dead, Long Live the King Brute Ratel C4 |
2021-06-01
⋅
Cisco
⋅
Backdoors, RATs, Loaders evasion techniques BazarNimrod GoldMax Oblique RAT |
2021-06-01
⋅
SANS
⋅
A Contrarian View on SolarWinds Cobalt Strike Raindrop SUNBURST TEARDROP |
2021-06-01
⋅
Microsoft
⋅
New sophisticated email-based attack from NOBELIUM Cobalt Strike |
2021-06-01
⋅
⋅
Rising Threat Intelligence Center
⋅
Rising warning: APT organizes Lazarus Group to launch an attack on China |
2021-06-01
⋅
CyberScoop
⋅
Ex-US ambassador, anti-corruption activists in Ukraine were targets of suspected Russian phishing |
2021-06-01
⋅
SentinelOne
⋅
NobleBaron | New Poisoned Installers Could Be Used In Supply Chain Attacks Cobalt Strike |
2021-06-01
⋅
Malwarebytes
⋅
Kimsuky APT continues to target South Korean government using AppleSeed backdoor Appleseed |
2021-06-01
⋅
Stratosphere Lab
⋅
Dissecting a RAT. Analysis of the Command-line AndroRAT. AndroRAT |
2021-06-01
⋅
Bitdefender
⋅
Threat Actors Use Mockups of Popular Apps to Spread Teabot and Flubot Malware on Android Anatsa FluBot |
2021-06-01
⋅
wordfence
⋅
Critical 0-day in Fancy Product Designer Under Active Attack |
2021-05-31
⋅
Wired
⋅
Hacker Lexicon: What Is a Supply Chain Attack? EternalPetya SUNBURST |
2021-05-31
⋅
DataBreaches.net
⋅
Babuk re-organizes as Payload Bin, offers its first leak Babuk HelloKitty |
2021-05-29
⋅
Twitter (@elisalem9)
⋅
Tweet on obfuscation mechanism and extraction procedure of COBALTSTRIKE beacon module used by NOBELIUM/UNC2452 Cobalt Strike |
2021-05-29
⋅
Youtube (AhmedS Kasmani)
⋅
Analysis of ICEID Malware Installer DLL IcedID |