Click here to download all references as Bib-File.•
2019-04-30
⋅
Cisco Talos
⋅
Sodinokibi ransomware exploits WebLogic Server vulnerability REvil |
2019-04-30
⋅
ESET Research
⋅
Buhtrap backdoor and Buran ransomware distributed via major advertising platform Buhtrap ClipBanker RTM |
2019-04-30
⋅
ClearSky
⋅
Raw Threat Intelligence 2019-04-30: Oilrig data dump link analysis SpyNote OopsIE |
2019-04-29
⋅
Blueliv
⋅
Where is Emotet? Latest geolocation data Emotet |
2019-04-26
⋅
Bleeping Computer
⋅
A Closer Look at the RobbinHood Ransomware RobinHood |
2019-04-25
⋅
⋅
DATANET
⋅
Chinese-based hackers attack domestic energy institutions CALMTHORN Ghost RAT |
2019-04-25
⋅
Cybereason
⋅
Threat Actor TA505 Targets Financial Enterprises Using LOLBins and a New Backdoor Malware ServHelper TA505 |
2019-04-25
⋅
AppGate
⋅
Meet Lucifer: A New International Trojan Astaroth |
2019-04-24
⋅
Check Point Research
⋅
Deobfuscating APT32 Flow Graphs with Cutter and Radare2 Salgorea |
2019-04-24
⋅
Weixin
⋅
"Sea Lotus" APT organization's attack techniques against China in the first quarter of 2019 revealed Cobalt Strike SOUNDBITE |
2019-04-24
⋅
Symantec
⋅
Beapy: Cryptojacking Worm Hits Enterprises in China Beapy |
2019-04-24
⋅
SpecterOps
⋅
Introducing Venator: A macOS tool for proactive detection AppleJeus WindTail |
2019-04-23
⋅
Kaspersky Labs
⋅
Operation ShadowHammer: a high-profile supply chain attack shadowhammer ShadowPad |
2019-04-22
⋅
KrebsOnSecurity
⋅
Who’s Behind the RevCode WebMonitor RAT? WebMonitor RAT |
2019-04-22
⋅
int 0xcc blog
⋅
Dissecting Emotet’s network communication protocol Emotet |
2019-04-19
⋅
Cylance
⋅
OceanLotus Steganography |
2019-04-19
⋅
Medium
⋅
Hacking (Back) and Influence Operations BONDUPDATER |
2019-04-19
⋅
ZDNet
⋅
Security researcher MalwareTech pleads guilty Kronos |
2019-04-18
⋅
Fortinet
⋅
Predator the Thief: New Routes of Delivery Predator The Thief |
2019-04-17
⋅
Cisco Talos
⋅
DNS Hijacking Abuses Trust In Core Internet Service Sea Turtle |