Click here to download all references as Bib-File.•
2021-05-05
⋅
K7 Security
⋅
Joker Joker |
2021-05-05
⋅
Symantec
⋅
Multi-Factor Authentication: Headache for Cyber Actors Inspires New Attack Techniques CHINACHOPPER |
2021-05-05
⋅
RiskIQ
⋅
Viruses to Violations - TrickBot's Shift in Tactics During the Pandemic TrickBot |
2021-05-05
⋅
Recorded Future
⋅
China’s PLA Unit 61419 Purchasing Foreign Antivirus Products, Likely for Exploitation |
2021-05-05
⋅
Kashif Ali Surfeit and Blasé Security
⋅
Roaming Mantis Amplifies Smishing Campaign with OS-Specific Android Malware MoqHao Roaming Mantis |
2021-05-05
⋅
The Record
⋅
Malware group leaks millions of stolen authentication cookies Raccoon |
2021-05-05
⋅
SophosLabs Uncut
⋅
Intervention halts a ProxyLogon-enabled attack Cobalt Strike |
2021-05-04
⋅
FireEye
⋅
The UNC2529 Triple Double: A Trifecta Phishing Campaign DOUBLEBACK |
2021-05-04
⋅
NCC Group
⋅
RM3 – Curiosities of the wildest banking malware ISFB RM3 |
2021-05-04
⋅
malware4all
⋅
Grab your own copy of Phenakite iOS malware today Phenakite |
2021-05-04
⋅
Lacework Labs
⋅
Cpuminer & Friends |
2021-05-04
⋅
Red Canary
⋅
Transferring leverage in a ransomware attack |
2021-05-04
⋅
in.security
⋅
Detecting Lateral Movement via WinRM Using KQL |
2021-05-04
⋅
Seguranca Informatica
⋅
A taste of the latest release of QakBot QakBot |
2021-05-04
⋅
Trend Micro
⋅
New Panda Stealer Targets Cryptocurrency Wallets Panda Stealer |
2021-05-04
⋅
Fox-IT
⋅
RM3 – Curiosities of the wildest banking malware ISFB |
2021-05-04
⋅
Medium sergiusechel
⋅
Improving the network-based detection of Cobalt Strike C2 servers in the wild while reducing the risk of false positives Cobalt Strike |
2021-05-04
⋅
Trustwave
⋅
Pingback: Backdoor At The End Of The ICMP Tunnel PingBack |
2021-05-04
⋅
Cr4sh / MicroBackdoor : Small and convenient C2 tool for Windows targets MicroBackdoor |
2021-05-03
⋅
Twitter (@y_advintel)
⋅
Tween on new RaaS Galaxy Ransomware |