Click here to download all references as Bib-File.•
2022-02-15
⋅
Proofpoint
⋅
Charting TA2541's Flight AsyncRAT TA2541 |
2022-01-27
⋅
Gigamon
⋅
Focusing on “Left of Boom” WhisperGate |
2022-01-19
⋅
Elastic
⋅
Operation Bleeding Bear WhisperGate |
2022-01-19
⋅
Elastic
⋅
Operation Bleeding Bear WhisperGate |
2021-12-30
⋅
Stranded on Pylos Blog
⋅
Lights Out in Isfahan |
2021-12-23
⋅
Elastic
⋅
Elastic Security uncovers BLISTER malware campaign Blister |
2021-12-21
⋅
Gigamon
⋅
The Log Keeps Rolling On: Evaluating Log4j Developments and Defensive Requirements |
2021-12-14
⋅
Gigamon
⋅
Network Security Monitoring Opportunities and Best Practices for Log4j Defense |
2021-11-17
⋅
BBC
⋅
Evil Corp: 'My hunt for the world's most wanted hackers' REvil REvil |
2021-11-16
⋅
IronNet
⋅
How IronNet's Behavioral Analytics Detect REvil and Conti Ransomware Cobalt Strike Conti IcedID REvil |
2021-11-04
⋅
Youtube (Virus Bulletin)
⋅
ShadowPad: the masterpiece of privately sold malware in Chinese espionage PlugX ShadowPad |
2021-10-27
⋅
Proofpoint
⋅
New Threat Actor Spoofs Philippine Government, COVID-19 Health Data in Widespread RAT Campaigns Nanocore RAT Remcos TA2722 |
2021-10-25
⋅
Gigamon
⋅
Bear in the Net: A Network-Focused Perspective on Berserk Bear |
2021-10-12
⋅
IronNet
⋅
Continued Exploitation of CVE-2021-26084 |
2021-10-03
⋅
Github (0xjxd)
⋅
SquirrelWaffle - From Maldoc to Cobalt Strike Cobalt Strike Squirrelwaffle |
2021-09-27
⋅
Trend Micro
⋅
Fake Installers Drop Malware and Open Doors for Opportunistic Attackers RedLine Stealer Socelars Vidar |
2021-09-10
⋅
Gigamon
⋅
Rendering Threats: A Network Perspective BumbleBee Cobalt Strike |
2021-09-09
⋅
Stranded on Pylos Blog
⋅
A Spectrum of State Ransomware Responsibility |
2021-09-01
⋅
YouTube (Hack In The Box Security Conference)
⋅
SHADOWPAD: Chinese Espionage Malware-as-a-Service PlugX ShadowPad |
2021-08-23
⋅
SentinelOne
⋅
ShadowPad: the Masterpiece of Privately Sold Malware in Chinese Espionage PlugX ShadowPad |