Click here to download all references as Bib-File.•
2021-04-19
⋅
WAR ON THE ROCKS
⋅
Great Power Cyber Party |
2021-04-19
⋅
Cybleinc
⋅
ZLoader Returns Through Spelevo Exploit Kit & Phishing Campaign Zloader |
2021-04-19
⋅
nviso
⋅
How to analyze mobile malware: a Cabassous/FluBot Case study FluBot |
2021-04-19
⋅
Youtube (AhmedS Kasmani)
⋅
Malware Analysis of a Password Stealer Poulight Stealer |
2021-04-19
⋅
Anomali
⋅
PRIMITIVE BEAR (Gamaredon) Targets Ukraine with Timely Themes |
2021-04-19
⋅
NEW YORKER
⋅
The Incredible Rise of North Korea’s Hacking Army |
2021-04-19
⋅
InfoSec Handlers Diary Blog
⋅
Hunting phishing websites with favicon hashes |
2021-04-19
⋅
Twitter (@_alex_il_)
⋅
Tweet on QakBot's additional decryption mechanism QakBot |
2021-04-19
⋅
Intel 471
⋅
How China’s cybercrime underground is making money off big data |
2021-04-19
⋅
Netresec
⋅
Analysing a malware PCAP with IcedID and Cobalt Strike traffic Cobalt Strike IcedID |
2021-04-19
⋅
Medium elis531989
⋅
Dancing With Shellcodes: Cracking the latest version of Guloader CloudEyE |
2021-04-19
⋅
CERT NZ
⋅
Microsoft 365 phishing using fake voicemail messages |
2021-04-18
⋅
BBC
⋅
1. Hacking Hollywood |
2021-04-18
⋅
YouTube (dist67)
⋅
Decoding Cobalt Strike Traffic Cobalt Strike |
2021-04-18
⋅
Twitter (@ViriBack)
⋅
Tweet on Seth Loader |
2021-04-17
⋅
Gru.gq
⋅
SVR snaps back at Biden |
2021-04-17
⋅
Advanced Intelligence
⋅
Adversary Dossier: Ryuk Ransomware Anatomy of an Attack in 2021 Ryuk |
2021-04-16
⋅
Trend Micro
⋅
XCSSET Quickly Adapts to macOS 11 and M1-based Macs XCSSET |
2021-04-16
⋅
InQuest
⋅
Unearthing Hancitor Infrastructure Hancitor |
2021-04-16
⋅
IBM
⋅
Combating Sleeper Threats With MTTD |