Click here to download all references as Bib-File.•
2020-07-13
⋅
Confiant
⋅
Internet Explorer CVE-2019–1367 Exploitation — part 1 |
2020-07-13
⋅
FireEye
⋅
SCANdalous! (External Detection Using Network Scan Data and Automation) POWERTON QUADAGENT PoshC2 |
2020-07-13
⋅
BleepingComputer
⋅
New AgeLocker Ransomware uses Googler's utility to encrypt files |
2020-07-13
⋅
JoeSecurity
⋅
TrickBot's new API-Hammering explained TrickBot |
2020-07-13
⋅
Confiant
⋅
Internet Explorer CVE-2019–1367 In the wild Exploitation - prelude |
2020-07-13
⋅
Microsoft
⋅
Become a Microsoft Defender ATP Ninja |
2020-07-13
⋅
Cofense
⋅
Fell Deeds Awake |
2020-07-12
⋅
Malware and Stuff
⋅
Deobfuscating DanaBot’s API Hashing DanaBot |
2020-07-11
⋅
BleepingComputer
⋅
TrickBot malware mistakenly warns victims that they are infected TrickBot |
2020-07-11
⋅
Advanced Intelligence
⋅
TrickBot Group Launches Test Module Alerting on Fraud Activity TrickBot |
2020-07-10
⋅
Vice
⋅
The Secret Service Tried to Catch a Hacker With a Malware Booby-Trap Dharma |
2020-07-10
⋅
FBI
⋅
Wanted poster: CHINA MSS GUANGDONG STATE SECURITY DEPARTMENT HACKERS BRONZE SPRING |
2020-07-10
⋅
360 netlab
⋅
The new Bigviktor Botnet is Targeting DrayTek Vigor Router BigViktor |
2020-07-10
⋅
Malwarebytes
⋅
Threat spotlight: WastedLocker, customized ransomware WastedLocker |
2020-07-10
⋅
Advanced Intelligence
⋅
The Dark Web of Intrigue: How REvil Used the Underground Ecosystem to Form an Extortion Cartel Gandcrab REvil |
2020-07-10
⋅
ByteAtlas
⋅
Knowledge Fragment: Casting Sandbox Necromancy on DADSTACHE DADSTACHE |
2020-07-10
⋅
ReversingLabs
⋅
YARA Rules talks and presentation of REVERSING 2020 |
2020-07-09
⋅
VMRay
⋅
Threat Bulletin: Dissecting GuLoader’s Evasion Techniques CloudEyE |
2020-07-09
⋅
Github (krautface)
⋅
Gist with observed grelos skimmer grelos |
2020-07-09
⋅
Checkpoint
⋅
New Joker variant hits Google Play with an old trick Joker |