Click here to download all references as Bib-File.•
2020-08-21
⋅
⋅
Baidu Security Emergency Response Center
⋅
Recurrence and research of macro attacks under macOS |
2020-08-21
⋅
Vimeo (RiskIQ)
⋅
The Evolution of Ransomware & Pinchy Spider's Shot at the Title Gandcrab REvil |
2020-08-21
⋅
Bleeping Computer
⋅
DarkSide: New targeted ransomware demands million dollar ransoms |
2020-08-20
⋅
sensecy
⋅
Global Ransomware Attacks in 2020: The Top 4 Vulnerabilities Clop Maze REvil Ryuk |
2020-08-20
⋅
ThreatConnect
⋅
[webinar] Proactive Infrastructure Hunting with ThreatConnect & DomainTools |
2020-08-20
⋅
Bitdefender
⋅
More Evidence of APT Hackers-for-Hire Usedfor Industrial Espionage |
2020-08-20
⋅
Morphisec
⋅
QakBot (QBot) Maldoc Campaign Introduces Two New Techniques into Its Arsenal QakBot |
2020-08-20
⋅
Kaspersky Labs
⋅
Transparent Tribe: Evolution analysis, part 1 Crimson RAT |
2020-08-20
⋅
⋅
Seebug Paper
⋅
Use ZoomEye to track multiple Redteam C&C post-penetration attack frameworks Cobalt Strike Empire Downloader PoshC2 |
2020-08-19
⋅
Akamai
⋅
FritzFrog: A New Generation Of Peer-To-Peer Botnets FritzFrog |
2020-08-19
⋅
CISA
⋅
MAR-10295134-1.v1 - North Korean Remote Access Trojan: BLINDINGCAN BLINDINGCAN |
2020-08-19
⋅
NTT Security
⋅
Operation LagTime IT: Colorful Panda Footprint 8.t Dropper Cotx RAT Poison Ivy TA428 |
2020-08-19
⋅
RiskIQ
⋅
RiskIQ Adventures in Cookie Land - Part 1 8.t Dropper Chinoxy |
2020-08-19
⋅
SecurityLiterate
⋅
Chantay’s Resume: Investigating a CV-Themed ZLoader Malware Zloader |
2020-08-19
⋅
PT SWARM
⋅
Performing Kerberoasting without SPNs |
2020-08-18
⋅
CUJOAI
⋅
UPX Anti-Unpacking Techniques in IoT Malware Mozi |
2020-08-18
⋅
Arete
⋅
Is Conti the New Ryuk? Conti Ryuk |
2020-08-18
⋅
Menlo Security
⋅
New Attack Alert: Duri |
2020-08-18
⋅
Medium mariohenkel
⋅
Decrypt MassLogger 2.4.0.0 configuration MASS Logger |
2020-08-17
⋅
Twitter (@Arkbird_SOLG)
⋅
Short twitter thread with analysis on Loup ATM malware Loup |