Click here to download all references as Bib-File.•
2022-03-30
⋅
The Record
⋅
Hive ransomware shuts down California health care organization Hive Hive |
2022-03-24
⋅
CSO Online
⋅
Microsoft help files repurposed to contain Vidar malware in new campaign Vidar |
2022-02-28
⋅
ZDNet
⋅
Microsoft finds FoxBlade malware on Ukrainian systems, removes RT from Windows app store HermeticWiper |
2022-02-18
⋅
Kookmin University
⋅
A Method for Decrypting Data Infected with Hive Ransomware Hive Hive |
2022-02-02
⋅
ZDNet
⋅
BlackCat ransomware implicated in attack on German oil companies BlackCat BlackCat |
2022-02-01
⋅
Medium walmartglobaltech
⋅
Sugar Ransomware, a new RaaS Sugar |
2022-01-27
⋅
Medium jonahacks
⋅
Malware Analysis —Manual Unpacking of Redaman RTM |
2022-01-27
⋅
ANALYST1
⋅
A History of Revil REvil REvil |
2021-12-17
⋅
Trend Micro
⋅
Staging a Quack: Reverse Analyzing a Fileless QAKBOT Stager QakBot |
2021-12-06
⋅
Mandiant
⋅
Suspected Russian Activity Targeting Government and Business Entities Around the Globe (UNC2452) Cobalt Strike CryptBot |
2021-12-01
⋅
ESET Research
⋅
Jumping the air gap: 15 years of nation‑state effort Agent.BTZ Fanny Flame Gauss PlugX Ramsay Retro Stuxnet USBCulprit USBferry |
2021-11-26
⋅
Twitter (@jhencinski)
⋅
Twitter Thread on weelky MDR recap from expel.io GootKit Squirrelwaffle |
2021-09-23
⋅
Cloudmark
⋅
TangleBot: New Advanced SMS Malware Targets Mobile Users Across U.S. and Canada with COVID-19 Lures |
2021-08-11
⋅
ANALYST1
⋅
Nation State Ransomware Ryuk Stealer |
2021-06-29
⋅
Medium MITRE-Engenuity
⋅
Security Control Mappings: A Starting Point for Threat-Informed Defense |
2021-06-17
⋅
⋅
Norwegian Police Security Service (PST)
⋅
Etterforskningen av datanettverksoperasjonen mot statsforvalterembeter henlegges APT31 |
2021-06-01
⋅
SpecterOps
⋅
Evadere Classifications |
2021-05-27
⋅
FireEye
⋅
Re-Checking Your Pulse: Updates on Chinese APT Actors Compromising Pulse Secure VPN Devices UNC2630 UNC2717 |
2021-05-05
⋅
zimperium
⋅
Flubot vs. Zimperium FluBot |
2021-04-20
⋅
FireEye
⋅
Check Your Pulse: Suspected APT Actors Leverage Authentication Bypass Techniques and Pulse Secure Zero-Day |