Click here to download all references as Bib-File.•
2021-12-21
⋅
Sophos
⋅
Attackers test “CAB-less 40444” exploit in a dry run |
2021-12-20
⋅
IronNet
⋅
Detecting anomalous network traffic resulting from a successful Log4j attack |
2021-12-20
⋅
⋅
Qianxin
⋅
First time using a dual platform attack weapon? Analysis of the suspected SideCopy organization's attack activities against India |
2021-12-20
⋅
Qianxin
⋅
India's Chief of Defence Staff Crashes: SideCopy APT takes advantage of the fire |
2021-12-20
⋅
Trend Micro
⋅
Ransomware Spotlight: REvil REvil REvil |
2021-12-20
⋅
Sophos
⋅
Logjam: Log4j exploit attempts continue in globally distributed scans, attacks |
2021-12-20
⋅
DefendAgainst: Ransomware ‘STOP’/DJVU STOP |
2021-12-20
⋅
Github (vithakur)
⋅
STOP/DJVU Ransomware IOC List STOP |
2021-12-20
⋅
InfoSec Handlers Diary Blog
⋅
PowerPoint attachments, Agent Tesla and code reuse in malware Agent Tesla |
2021-12-20
⋅
InQuest
⋅
(Don't) Bring Dridex Home for the Holidays DoppelDridex Dridex |
2021-12-20
⋅
Bleeping Computer
⋅
Log4j vulnerability now used to install Dridex banking malware DoppelDridex Meterpreter |
2021-12-20
⋅
YouTube (Malienist)
⋅
Revil Linux Ransomware: Revix REvil |
2021-12-19
⋅
BleepingComputer
⋅
Exposed Docker APIs Abused by DDoS, Cryptojacking Botnet Malware MrBlack |
2021-12-17
⋅
⋅
Netzpolitik.org
⋅
Wir enthüllen den Staatstrojaner „Subzero“ aus Österreich Subzero |
2021-12-17
⋅
DSIRF
⋅
DSIRF Company Presentation Subzero |
2021-12-17
⋅
Secureworks
⋅
noPac: A Tale of Two Vulnerabilities That Could End in Ransomware |
2021-12-17
⋅
Sophos
⋅
Inside the code: How the Log4Shell exploit works |
2021-12-17
⋅
Trend Micro
⋅
Staging a Quack: Reverse Analyzing a Fileless QAKBOT Stager QakBot |
2021-12-17
⋅
FBI
⋅
AC-000159-MW: APT Actors Exploiting Newly-Identified Zero Day in ManageEngine Desktop Central (CVE-2021-44515) ShadowPad |
2021-12-17
⋅
Chuongdong blog
⋅
Diavol Ransomware Diavol |