Click here to download all references as Bib-File.•
2022-01-21
⋅
Medium (Cryptax)
⋅
Creating a safe dummy C&C to test Android bots BianLian Hydra |
2022-01-21
⋅
vmware
⋅
Emotet Is Not Dead (Yet) Emotet |
2022-01-21
⋅
MalGamy
⋅
Deep Analysis Agent Tesla Malware Agent Tesla |
2022-01-21
⋅
Twitte (@s4tan)
⋅
Analyzing an IDA Pro anti-decompilation code |
2022-01-21
⋅
Twitter (@_CPResearch_)
⋅
Tweet on WhiteLambert malware Lambert |
2022-01-21
⋅
Zscaler
⋅
Analysis of Xloader’s C2 Network Encryption Xloader Formbook |
2022-01-21
⋅
Talos Intelligence
⋅
Ukraine Campaign Delivers Defacement and Wipers, in Continued Escalation WhisperGate |
2022-01-21
⋅
Secureworks
⋅
WhisperGate: Not NotPetya WhisperGate |
2022-01-21
⋅
Secureworks
⋅
Disruptive Attacks in Ukraine Likely Linked to Escalating Tensions WhisperGate |
2022-01-21
⋅
Zero Day
⋅
Hackers Were in Ukraine Systems Months Before Deploying Wiper WhisperGate |
2022-01-21
⋅
Trend Micro
⋅
Emotet Spam Abuses Unconventional IP Address Formats to Spread Malware Emotet |
2022-01-21
⋅
Github (OALabs)
⋅
WhisperGate Malware WhisperGate |
2022-01-21
⋅
binarly
⋅
A deeper UEFI dive into MoonBounce MoonBounce |
2022-01-20
⋅
Fortinet
⋅
New STRRAT RAT Phishing Campaign STRRAT |
2022-01-20
⋅
TEHTRIS
⋅
Buer Loader Analysis, a Rusted malware program Buer |
2022-01-20
⋅
BrightTALK (Mandiant)
⋅
Anticipating and Preparing for Russian Cyber Activity |
2022-01-20
⋅
blog.rootshell.be
⋅
[SANS ISC] RedLine Stealer Delivered Through FTP RedLine Stealer |
2022-01-20
⋅
Cado Security
⋅
Fallout from Log4Shell-related Vietnamese Cryptocurrency Exchange Attack: KYC Data for Sale on Dark Web |
2022-01-20
⋅
Twitter (@ClearskySec)
⋅
Tweet on ComLook backdoor used by Turla ComLook |
2022-01-20
⋅
Cybleinc
⋅
Deep Dive Into Ragnar_locker Ransomware Gang RagnarLocker |