Click here to download all references as Bib-File.•
2022-03-08
⋅
Springer
⋅
Mobile Forensics – The File Format Handbook |
2022-03-07
⋅
CrowdStrike
⋅
PROPHET SPIDER Exploits Citrix ShareFile Remote Code Execution Vulnerability CVE-2021-22941 to Deliver Webshell Prophet Spider |
2022-02-28
⋅
Reuters
⋅
New Chinese hacking tool found, spurring U.S. warning to allies Daxin |
2022-02-24
⋅
IBM
⋅
IBM Security X-Force Research Advisory: New Destructive Malware Used In Cyber Attacks on Ukraine HermeticWiper |
2022-02-18
⋅
Reuters
⋅
How a Saudi woman's iPhone revealed hacking around the world Chrysaor |
2022-02-17
⋅
Trellix
⋅
Looking over the nation-state actors’ shoulders: Even they have a difficult day sometimes Empire Downloader |
2022-01-27
⋅
SCYTHE
⋅
Adversary Emulation Diavol Ransomware #ThreatThursday Diavol |
2022-01-25
⋅
Trellix
⋅
Prime Minister’s Office Compromised: Details of Recent Espionage Campaign Graphite |
2022-01-21
⋅
Talos Intelligence
⋅
Ukraine Campaign Delivers Defacement and Wipers, in Continued Escalation WhisperGate |
2022-01-20
⋅
Trellix
⋅
Return of Pseudo Ransomware WhisperGate |
2022-01-11
⋅
Twitter (@cglyer)
⋅
Tweet on CN based ransomware operator using log4shell to deploy NightSky NightSky BRONZE STARLIGHT |
2022-01-11
⋅
Twitter (@cglyer)
⋅
Thread on DEV-0401, a china based ransomware operator exploiting VMware Horizon with log4shell and deploying NightSky ransomware Cobalt Strike NightSky |
2021-11-18
⋅
Mandiant
⋅
Introducing Mandiant's Digital Forensics and Incident Response Framework for Embedded OT Systems |
2021-11-05
⋅
Trend Micro
⋅
A Review and Analysis of 2021 Buer Loader Campaigns Buer |
2021-11-05
⋅
Trend Micro
⋅
An Analysis of Buer Loader Buer |
2021-11-02
⋅
SpearTip
⋅
FBI Warning: HelloKitty Ransomware Add DDoS to Extortion Arsenal HelloKitty |
2021-10-22
⋅
Reuters
⋅
EXCLUSIVE Governments turn tables on ransomware gang REvil by pushing it offline REvil REvil |
2021-09-14
⋅
McAfee
⋅
Operation ‘Harvest’: A Deep Dive into a Long-term Campaign MimiKatz PlugX Winnti |
2021-09-14
⋅
CSO Online
⋅
Russia is fully capable of shutting down cybercrime |
2021-09-01
⋅
YouTube (Black Hat)
⋅
How Did the Adversaries Abusing the Bitcoin Blockchain Evade Our Takeover? Cerber Pony |