Click here to download all references as Bib-File.•
2021-10-05
⋅
Seguranca Informatica
⋅
Malware analysis: Details on LockBit ransomware LockBit |
2021-10-05
⋅
Sophos
⋅
Python ransomware script targets ESXi server for encryption |
2021-10-05
⋅
Medium s2wlab
⋅
Prometheus x Spook: Prometheus ransomware rebranded Spook ransomware. Prometheus |
2021-10-05
⋅
EXPMON
⋅
Regarding the Threats Posed by Encrypted Office Files |
2021-10-05
⋅
Recorded Future
⋅
Illegal Activities Endure on China's Dark Web Despite Strict Internet Control |
2021-10-05
⋅
Blackberry
⋅
Drawing a Dragon: Connecting the Dots to Find APT41 Cobalt Strike Ghost RAT |
2021-10-04
⋅
Github (OALabs)
⋅
Reverse engineered the Hancitor DLL and built a static config extractor Hancitor |
2021-10-04
⋅
Proofpoint
⋅
Mobile Malware: TangleBot Untangled TangleBot |
2021-10-04
⋅
Cisco
⋅
Threat hunting in large datasets by clustering security events BazarBackdoor TrickBot |
2021-10-04
⋅
Sophos
⋅
Atom Silo ransomware actors use Confluence exploit, DLL side-load for stealthy attack ATOMSILO Cobalt Strike |
2021-10-04
⋅
nviso
⋅
Phish, Phished, Phisher: A Quick Peek Inside a Telegram Harvester |
2021-10-04
⋅
pid4.io
⋅
How to Write a Hancitor Extractor in Go Hancitor |
2021-10-04
⋅
The DFIR Report
⋅
BazarLoader and the Conti Leaks BazarBackdoor Cobalt Strike Conti |
2021-10-04
⋅
JPCERT/CC
⋅
Malware Gh0stTimes Used by BlackTech Gh0stTimes Ghost RAT |
2021-10-04
⋅
JPMinty
⋅
STRRAT Analysis STRRAT |
2021-10-03
⋅
blag.nullteilerfrei.de
⋅
Using Windows Sandbox for Malware Analysis |
2021-10-03
⋅
Github (0xjxd)
⋅
SquirrelWaffle - From Maldoc to Cobalt Strike Cobalt Strike Squirrelwaffle |
2021-10-02
⋅
Trend Micro
⋅
PUA.Win32.Adload.AI |
2021-10-01
⋅
Microsoft
⋅
Microsoft Digital Defense Report Sea Turtle |
2021-10-01
⋅
HP
⋅
Threat Insights Report Q3 - 2021 STRRAT CloudEyE NetWire RC Remcos TrickBot Vjw0rm |