Click here to download all references as Bib-File.•
2021-01-04
⋅
KELA
⋅
Darknet Threat Actors Are Not Playing Games with the Gaming Industry REvil |
2021-01-04
⋅
splunk
⋅
Detecting Supernova Malware: SolarWinds Continued SUPERNOVA |
2021-01-04
⋅
Netresec
⋅
Finding Targeted SUNBURST Victims with pDNS SUNBURST |
2021-01-04
⋅
Check Point
⋅
DRIDEX Stopping Serial Killer: Catching the Next Strike Dridex |
2021-01-04
⋅
Bleeping Computer
⋅
TransLink confirms ransomware data theft, still restoring systems Egregor |
2021-01-03
⋅
Chuongdong blog
⋅
Babuk Ransomware Babuk |
2021-01-03
⋅
⋅
EST Security
⋅
Thallium organization exploits private stock investment messenger to attack software supply chain |
2021-01-02
⋅
The Wall Street Journal
⋅
How Russia’s ‘Info Warrior’ Hackers Let Kremlin Play Geopolitics on the Cheap |
2021-01-02
⋅
The New York Times
⋅
As Understanding of Russian Hacking Grows, So Does Alarm |
2021-01-02
⋅
Twitter (MalwareHunterTeam)
⋅
Tweet on Knot Ransomware Knot |
2021-01-01
⋅
Secureworks
⋅
GOLD PRELUDE GOLD PRELUDE |
2021-01-01
⋅
AWAKE
⋅
Breaking the Ice: Detecting IcedID and Cobalt Strike Beacon with Network Detection and Response (NDR) Cobalt Strike IcedID PhotoLoader |
2021-01-01
⋅
lodestone
⋅
White Rabbit Ransomware and the F5 Backdoor |
2021-01-01
⋅
Symantec
⋅
Supply Chain Attacks:Cyber Criminals Target the Weakest Link Cobalt Strike Raindrop SUNBURST TEARDROP |
2021-01-01
⋅
⋅
Github (WBGlIl)
⋅
A book on cobaltstrike Cobalt Strike |
2021-01-01
⋅
Acronis
⋅
Taking Deep Dive into Sodinokibi Ransomware REvil |
2021-01-01
⋅
Acronis
⋅
Analysis of Ragnar Locker Ransomware RagnarLocker |
2021-01-01
⋅
DomainTools
⋅
Conceptualizing a Continuum of Cyber Threat Attribution CHINACHOPPER SUNBURST |
2021-01-01
⋅
Google
⋅
Burning the Haystack: Malware Lead Generation at Scale |
2021-01-01
⋅
Secureworks
⋅
Threat Profile: GOLD GALLEON Agent Tesla HawkEye Keylogger Pony GOLD GALLEON |