Click here to download all references as Bib-File.•
2024-05-07
⋅
⋅
Gatewatcher
⋅
Cybercrime's Anatomy Threats to the Healthcare World |
2024-05-06
⋅
Cyber-Forensics
⋅
Agent Tesla Malware Analysis Agent Tesla |
2024-05-04
⋅
Medium MITRE-Engenuity
⋅
Technical Deep Dive: Understanding the Anatomy of a Cyber Intrusion WIREFIRE |
2024-05-01
⋅
⋅
Macnica
⋅
The Reality of Targeted Attacks and Countermeasures: Trends in Cyber Espionage (Targeted Attacks) Targeting Japan FY2023 LODEINFO NOOPDOOR |
2024-05-01
⋅
Trend Micro
⋅
Router Roulette: Cybercriminals and Nation-States Sharing Compromised Networks SSHDoor |
2024-04-30
⋅
Intrinsec
⋅
Matanbuchus & Co: Code Emulation and Cybercrime Infrastructure Discovery FAKEUPDATES Matanbuchus |
2024-04-29
⋅
cyber5w
⋅
How to unpack Death Ransomware DeathRansom |
2024-04-25
⋅
Mandiant
⋅
Poll Vaulting: Cyber Threats to Global Elections |
2024-04-19
⋅
⋅
Cert-UA
⋅
UAC-0133 (Sandworm) plans for cyber sabotage on almost 20 objects of critical infrastructure of Ukraine Kapeka reGeorg |
2024-04-19
⋅
Medium MITRE-Engenuity
⋅
Advanced Cyber Threats Impact Even the Most Prepared |
2024-04-18
⋅
Avast
⋅
From BYOVD to a 0-day: Unveiling Advanced Exploits in Cyber Recruiting Scams FudModule |
2024-04-16
⋅
HarfangLab
⋅
Analysis of the APT31 Indictment RAWDOOR APT31 |
2024-04-13
⋅
cyber5w
⋅
Analysis of malicious Microsoft office macros AsyncRAT Ave Maria |
2024-04-07
⋅
cyber5w
⋅
Gafgyt Backdoor Analysis Bashlite |
2024-03-27
⋅
EclecticIQ
⋅
Operation FlightNight: Indian Government Entities and Energy Sector Targeted by Cyber Espionage Campaign HackBrowserData |
2024-03-21
⋅
cyber5w
⋅
CryptNet Ransomware Detailed Analysis CryptNET |
2024-03-20
⋅
Microsoft
⋅
Tax season cybersecurity: What cybercriminals want and who they target most. Is it you? |
2024-03-20
⋅
CISA
⋅
Review of the Summer 2023 Microsoft Exchange Online Intrusion Storm-0558 |
2024-03-15
⋅
cyber5w
⋅
Matanbuchus Loader Detailed Analysis Matanbuchus |
2024-03-14
⋅
Orange Cyberdefense
⋅
Unveiling the depths of residential proxies providers |