Click here to download all references as Bib-File.•
2023-10-20
⋅
Twitter (@embee_research)
⋅
Decoding a Cobalt Strike .hta Loader Using CyberChef and Emulation Cobalt Strike |
2023-10-18
⋅
Twitter (@embee_research)
⋅
Ghidra Tutorial - Using Entropy To Locate a Cobalt Strike Decryption Function Cobalt Strike |
2023-10-12
⋅
Cluster25
⋅
CVE-2023-38831 Exploited by Pro-Russia Hacking Groups in RU-UA Conflict Zone for Credential Harvesting Operations Agent Tesla Crimson RAT Nanocore RAT SmokeLoader |
2023-09-12
⋅
⋅
ANSSI
⋅
FIN12: A Cybercriminal Group with Multiple Ransomware BlackCat Cobalt Strike Conti Hive MimiKatz Nokoyawa Ransomware PLAY Royal Ransom Ryuk SystemBC |
2023-09-04
⋅
⋅
Cert-UA
⋅
APT28 cyberattack: msedge as a bootloader, TOR and mockbin.org/website.hook services as a control center (CERT-UA#7469) |
2023-09-04
⋅
AhnLab
⋅
CHM Malware Using Fukushima Contaminated Water Discharge: RedEyes (ScarCruft) |
2023-08-08
⋅
Security Service of Ukraine
⋅
Cyber Operation of Russian Intelligence Services as a Component of Confrontation on the Battlefield |
2023-08-07
⋅
Trend Micro
⋅
Latest Batloader Campaigns Use Pyarmor Pro for Evasion BATLOADER |
2023-08-07
⋅
SentinelOne
⋅
Comrades in Arms? | North Korea Compromises Sanctioned Russian Missile Engineering Company OpenCarrot |
2023-07-25
⋅
Zscaler
⋅
Hibernating Qakbot: A Comprehensive Study and In-depth Campaign Analysis QakBot |
2023-07-07
⋅
Rapid7 Labs
⋅
Exploitation of Mitel MiVoice Connect SA CVE-2022-29499 |
2023-07-04
⋅
The Record
⋅
Fort Worth officials say leaked data came from Public Information Act request SiegedSec |
2023-06-23
⋅
Trendmicro
⋅
An Overview of the Different Versions of the Trigona Ransomware Trigona |
2023-06-06
⋅
Security Intelligence
⋅
ITG10 Likely Targeting South Korean Entities of Interest to the Democratic People’s Republic of Korea (DPRK) RokRAT |
2023-05-18
⋅
zimperium
⋅
Zimperium’s MTD Against OilAlpha: A Comprehensive Defense Strategy OilAlpha |
2023-05-16
⋅
Check Point Research
⋅
The Dragon Who Sold his Camaro: Analyzing a Custom Router Implant Horse Shell Camaro Dragon |
2023-05-10
⋅
Dragos
⋅
Deconstructing a Cybersecurity Event |
2023-05-04
⋅
SecurityScorecard
⋅
How to Analyze Java Malware – A Case Study of STRRAT STRRAT |
2023-04-28
⋅
Twitter (@MalGamy12)
⋅
Tweet explaning similarity between Conti and Akira code Akira |
2023-04-26
⋅
Bitdefender
⋅
Unpacking BellaCiao: A Closer Look at Iran’s Latest Malware BellaCiao |