Click here to download all references as Bib-File.•
| 2022-03-23
            
            ⋅
            
            Fortinet
            ⋅ Bad Actors Trying to Capitalize on Current Events via Shameless Email Scams Emotet | 
| 2022-03-23
            
            ⋅
            
            Fortinet
            ⋅ MS Office Files Involved Again in Recent Emotet Trojan Campaign – Part II Emotet | 
| 2022-03-23
            
            ⋅
            
            BleepingComputer
            ⋅ New Mustang Panda hacking campaign targets diplomats, ISPs PlugX | 
| 2022-03-23
            
            ⋅
            
            
            ⋅
            
            Qianxin
            ⋅ Analysis of Attack Activity of PROMETHIUM Disguised StrongPity | 
| 2022-03-23
            
            ⋅
            
            InfoSec Handlers Diary Blog
            ⋅ Arkei Variants: From Vidar to Mars Stealer Arkei Stealer Mars Stealer Vidar | 
| 2022-03-23
            
            ⋅
            
            ESET Research
            ⋅ Mustang Panda’s Hodur: Old tricks, new Korplug variant Hodur PlugX | 
| 2022-03-23
            
            ⋅
            
            MSSPAlert
            ⋅ LokiLocker Ransomware May Use False Flag to Avoid Identification LokiLocker | 
| 2022-03-23
            
            ⋅
            
            KrebsOnSecurity
            ⋅ A Closer Look at the LAPSUS$ Data Extortion Group RedLine Stealer | 
| 2022-03-23
            
            ⋅
            
            NVISO Labs
            ⋅ Hunting Emotet campaigns with Kusto Emotet | 
| 2022-03-23
            
            ⋅
            
            Intel 471
            ⋅ Conti puts the ‘organized’ in organized crime Conti | 
| 2022-03-22
            
            ⋅
            
            JPCERT/CC
            ⋅ JSAC 2022 -Day 1- BlackTech | 
| 2022-03-22
            
            ⋅
            
            Microsoft
            ⋅ DEV-0537 criminal actor targeting organizations for data exfiltration and destruction LAPSUS | 
| 2022-03-22
            
            ⋅
            
            Microsoft
            ⋅ DEV-0537 (UNC3661) criminal actor targeting organizations for data exfiltration and destruction RedLine Stealer LAPSUS | 
| 2022-03-22
            
            ⋅
            
            Rewterz Information Security
            ⋅ Russian-Ukrainian Cyber Warfare – Rewterz Threat Intelligence Rollup NB65 | 
| 2022-03-22
            
            ⋅
            
            Avast Decoded
            ⋅ Operation Dragon Castling: APT group targeting betting companies FormerFirstRAT MulCom TianWu | 
| 2022-03-22
            
            ⋅
            
            Trustwave
            ⋅ Dissecting a Phishing Campaign with a Captcha-based URL | 
| 2022-03-22
            
            ⋅
            
            
            ⋅
            
            360 Threat Intelligence Center
            ⋅ Quantum Attack System – NSA "APT-C-40" Hacking Organization High-end Cyber Attack Weapon Technical Analysis Report (I) | 
| 2022-03-22
            
            ⋅
            
            Bitdefender
            ⋅ BitRAT Malware Seen Spreading Through Unofficial Microsoft Windows Activators BitRAT | 
| 2022-03-22
            
            ⋅
            
            YouTube (0xca7)
            ⋅ Blackguard Infostealer BlackGuard | 
| 2022-03-22
            
            ⋅
            
            Kroll
            ⋅ Analyzing Exmatter: A Ransomware Data Exfiltration Tool ExMatter |