Click here to download all references as Bib-File.•
2020-05-11
⋅
SentinelOne
⋅
The Anatomy of an APT Attack and CobaltStrike Beacon’s Encoded Configuration Cobalt Strike |
2020-05-11
⋅
KrebsOnSecurity
⋅
Ransomware Hit ATM Giant Diebold Nixdorf |
2020-05-11
⋅
Seguranca Informatica
⋅
Trojan Lampion is back after 3 months lampion |
2020-05-11
⋅
Cisco Talos
⋅
Astaroth - Maze of obfuscation and evasion reveals dark stealer Astaroth |
2020-05-11
⋅
Trend Micro
⋅
New MacOS Dacls RAT Backdoor Show Lazarus’ Multi-Platform Attack Capability Dacls |
2020-05-10
⋅
KELA
⋅
The Duties Beyond Assisting the Public: Darknet Threats Against Canadian Health & Support Organizations |
2020-05-10
⋅
YouTube ( IntroSecCon Videos)
⋅
Intro Sec Con 2020: Daniel Gordon - Threat Intelligence 101 |
2020-05-09
⋅
360 Total Security
⋅
ClodCore: A malware family that delivers mining modules through cloud control |
2020-05-08
⋅
MITRE
⋅
Inception PowerShower LaZagne Inception Framework |
2020-05-08
⋅
MITRE
⋅
Inception PowerShower LaZagne |
2020-05-08
⋅
Kaspersky Labs
⋅
Naikon’s Aria Aria-body |
2020-05-07
⋅
Council on Foreign Relations
⋅
Axiom APT17 |
2020-05-07
⋅
Der Spiegel
⋅
Ruhr-Universität Bochum meldet Computerangriff |
2020-05-07
⋅
Venom Remote Administration Tool (from Venom Software!) Venom RAT |
2020-05-07
⋅
Red Canary
⋅
Detecting COR_PROFILER manipulation for persistence |
2020-05-07
⋅
FireEye Inc
⋅
Navigating the MAZE: Tactics, Techniques and Procedures Associated With MAZE Ransomware Incidents Maze |
2020-05-07
⋅
Github (mlodic)
⋅
Ursnif beacon decryptor Gozi ISFB |
2020-05-07
⋅
The Citizenlab
⋅
We Chat, They Watch: How International Users Unwittingly Build up WeChat’s Chinese Censorship Apparatus |
2020-05-06
⋅
Yoroi
⋅
New Cyber Operation Targets Italy: Digging Into the Netwire Attack Chain NetWire RC |
2020-05-06
⋅
Cyber Struggle
⋅
Leery Turtle Threat Report CageyChameleon |