Click here to download all references as Bib-File.•
2020-09-24
⋅
CrowdStrike
⋅
Double Trouble: Ransomware with Data Leak Extortion, Part 1 DoppelPaymer Gandcrab LockBit Maze MedusaLocker RagnarLocker SamSam OUTLAW SPIDER OVERLORD SPIDER |
2020-09-24
⋅
SophosLabs
⋅
Email-delivered MoDi RAT attack pastes PowerShell commands MoDi RAT |
2020-09-24
⋅
Bitdefender
⋅
Apps on Google Play Tainted with Cerberus Banker Malware Cerberus |
2020-09-24
⋅
Kaspersky Labs
⋅
Threat landscape for industrial automation systems - H1 2020 Poet RAT Mailto Milum RagnarLocker REvil Ryuk Snake |
2020-09-24
⋅
Bleeping Computer
⋅
Mount Locker ransomware joins the multi-million dollar ransom game Mount Locker |
2020-09-24
⋅
Facebook
⋅
Removing Coordinated Inauthentic Behavior |
2020-09-24
⋅
Graphika
⋅
GRU and the Minions: Further Exposures of Russian Military Assets Across Platforms, 2013-2020 |
2020-09-24
⋅
SophosLabs Uncut
⋅
Email-delivered MoDi RAT attack pastes PowerShell commands DBatLoader |
2020-09-24
⋅
Click All the Things! Blog
⋅
zLoader XLM Update: Macro code and behavior change Zloader |
2020-09-24
⋅
CARO
⋅
Cycldek aka Goblin Panda: Chronicles of the Goblin NewCore RAT USBCulprit |
2020-09-24
⋅
Microsoft
⋅
Microsoft Security—detecting empires in the cloud CACTUSTORCH LazyCat APT40 |
2020-09-23
⋅
paloalto Netoworks: Unit42
⋅
Case Study: Emotet Thread Hijacking, an Email Attack Technique Emotet |
2020-09-23
⋅
Seqrite
⋅
Operation SideCopy! SideCopy |
2020-09-23
⋅
Kaspersky Labs
⋅
Looking for sophisticated malware in IoT devices |
2020-09-23
⋅
BleepingComputer
⋅
AgeLocker ransomware targets QNAP NAS devices, steals data |
2020-09-23
⋅
Seqrite
⋅
Operation SideCopy: An insight into Transparent Tribe’s sub-division which has been incorrectly attributed for years CACTUSTORCH AllaKore |
2020-09-23
⋅
Stranded on Pylos Blog
⋅
Understanding Uncertainty while Undermining Democracy |
2020-09-23
⋅
Group-IB
⋅
Big Game Hunting: Now in Russia |
2020-09-23
⋅
Twitter (@demonslay335)
⋅
Tweet on Ironcat (Sodinokibi imposter) Ironcat |
2020-09-22
⋅
vmware
⋅
Detecting Threats in Real-time With Active C2 Information Agent.BTZ Cobalt Strike Dacls NetWire RC PoshC2 Winnti |