Click here to download all references as Bib-File.•
2021-04-03
⋅
DataBreaches.net
⋅
SG: Vhive attackers escalate, take control of furniture retailer’s email server ALTDOS |
2021-04-02
⋅
NRC Handelsblad
⋅
The cesspool of the internet is to be found in a village in North Holland Zeus |
2021-04-02
⋅
Morphisec
⋅
The “Fair” Upgrade Variant of Phobos Ransomware Makop Phobos |
2021-04-02
⋅
Kaspersky
⋅
Browser lockers: extortion disguised as a fine |
2021-04-02
⋅
Joint CSA AA21-092A: APT Actors Exploit Vulnerabilitiesto Gain Initial Access for Future Attacks |
2021-04-02
⋅
360 Total Security
⋅
A “txt file” can steal all your secrets Poulight Stealer |
2021-04-02
⋅
Dr.Web
⋅
Study of targeted attacks on Russian research institutes Cotx RAT Ghost RAT TA428 |
2021-04-01
⋅
Cybereason
⋅
Cybereason vs. DarkSide Ransomware DarkSide |
2021-04-01
⋅
CISA
⋅
Defending Against Software Supply Chain Attacks |
2021-04-01
⋅
humansecurity
⋅
PARETO: A Technical Analysis |
2021-04-01
⋅
Reversing Labs
⋅
Code Reuse Across Packers and DLL Loaders IcedID SystemBC |
2021-04-01
⋅
SentinelOne
⋅
Avaddon RaaS | Breaks Public Decryptor, Continues On Rampage Avaddon |
2021-04-01
⋅
Palo Alto Networks Unit 42
⋅
Wireshark Tutorial: Decrypting RDP Traffic |
2021-04-01
⋅
Medium mikko-kenttala
⋅
Zero click vulnerability in Apple’s macOS Mail |
2021-04-01
⋅
Microsoft
⋅
Automating threat actor tracking: Understanding attacker behavior for intelligence and contextual alerting |
2021-04-01
⋅
Palo Alto Networks Unit 42
⋅
Hancitor’s Use of Cobalt Strike and a Noisy Network Ping Tool Cobalt Strike Hancitor Moskalvzapoe |
2021-04-01
⋅
DomainTools
⋅
COVID-19 Phishing With a Side of Cobalt Strike Cobalt Strike |
2021-03-31
⋅
FireEye
⋅
Back in a Bit: Attacker Use of the Windows Background Intelligent Transfer Service |
2021-03-31
⋅
Kaspersky
⋅
Financial Cyberthreats in 2020 BetaBot DanaBot Emotet Gozi Ramnit RTM SpyEye TrickBot Zeus |
2021-03-31
⋅
Twitter (@hatr)
⋅
Tweet on Ghostwriter Ghostwriter |