Click here to download all references as Bib-File.•
2020-12-02
⋅
Sansec
⋅
Persistent parasite in EOL Magento 2 stores wakes at Black Friday magecart |
2020-12-02
⋅
CyberInt
⋅
IcedID Stealer Man-in-the-browser Banking Trojan IcedID |
2020-12-02
⋅
RiskIQ
⋅
Shadow Academy: Hiding in the shadows of Mabna Institute Silent Librarian |
2020-12-02
⋅
Red Canary
⋅
Tweet on increased #Qbot activity delivering Cobalt Strike & #Egregor ransomware Cobalt Strike Egregor QakBot |
2020-12-02
⋅
SentinelOne
⋅
APT32 Multi-stage macOS Trojan Innovates on Crimeware Scripting Technique OceanLotus |
2020-12-02
⋅
RiskIQ
⋅
‘Shadow Academy’ Targets 20 Universities Worldwide |
2020-12-02
⋅
Kryptos Logic
⋅
Automated string de-gobfuscation Blackrota |
2020-12-02
⋅
DomainTools
⋅
Identifying Network Infrastructure Related to a World Health Organization Spoofing Campaign Azorult Glupteba |
2020-12-02
⋅
ESET Research
⋅
Turla Crutch: Keeping the “back door” open Crutch Gazer Turla |
2020-12-01
⋅
⋅
LAC
⋅
[Urgent Report] Targeted attack by "SigLoader" that exploits Microsoft's digital signature file confirmed SigLoader |
2020-12-01
⋅
Qianxin
⋅
Blade Eagle Group - Targeted attack group activities circling the Middle East and West Asia's cyberspace revealed SpyNote BladeHawk |
2020-12-01
⋅
Juniper
⋅
DarkIRC bot exploits recent Oracle WebLogic vulnerability DarkIRC |
2020-12-01
⋅
Group-IB
⋅
Egregor ransomware: The legacy of Maze lives on Egregor QakBot |
2020-12-01
⋅
Intel 471
⋅
Steal, then strike: Access merchants are first clues to future ransomware attacks DoppelPaymer |
2020-12-01
⋅
FireEye
⋅
Using Speakeasy Emulation Framework Programmatically to Unpack Malware |
2020-12-01
⋅
FREE RUSSIA FOUNDATION
⋅
Aquarium Leaks. Inside the GRU’S Psychological Warfare Program |
2020-12-01
⋅
mez0.cc
⋅
Cobalt Strike PowerShell Execution Cobalt Strike |
2020-12-01
⋅
Talos
⋅
Xanthe - Docker aware miner Xanthe |
2020-12-01
⋅
Trend Micro
⋅
The Impact of Modern Ransomware on Manufacturing Networks Maze Petya REvil |
2020-12-01
⋅
CitizenLab
⋅
Running in Circles Uncovering the Clients of Cyberespionage Firm Circles |