Click here to download all references as Bib-File.•
| 2019-05-01
⋅
ESET Research
⋅
TURLA LIGHTNEURON: One email away from remote code execution LightNeuron |
| 2019-05-01
⋅
ClearSky
⋅
Iranian Nation-State APT Groups 'Black Box' Leak [Unnamed group] |
| 2019-04-30
⋅
Council on Foreign Relations
⋅
APT 40 APT40 |
| 2019-04-30
⋅
Cisco Talos
⋅
Sodinokibi ransomware exploits WebLogic Server vulnerability REvil |
| 2019-04-30
⋅
ESET Research
⋅
Buhtrap backdoor and Buran ransomware distributed via major advertising platform Buhtrap ClipBanker RTM |
| 2019-04-30
⋅
ClearSky
⋅
Raw Threat Intelligence 2019-04-30: Oilrig data dump link analysis SpyNote OopsIE |
| 2019-04-29
⋅
Blueliv
⋅
Where is Emotet? Latest geolocation data Emotet |
| 2019-04-26
⋅
Bleeping Computer
⋅
A Closer Look at the RobbinHood Ransomware RobinHood |
| 2019-04-25
⋅
⋅
DATANET
⋅
Chinese-based hackers attack domestic energy institutions CALMTHORN Ghost RAT |
| 2019-04-25
⋅
Cybereason
⋅
Threat Actor TA505 Targets Financial Enterprises Using LOLBins and a New Backdoor Malware ServHelper TA505 |
| 2019-04-25
⋅
AppGate
⋅
Meet Lucifer: A New International Trojan Astaroth |
| 2019-04-24
⋅
Check Point Research
⋅
Deobfuscating APT32 Flow Graphs with Cutter and Radare2 Salgorea |
| 2019-04-24
⋅
Weixin
⋅
"Sea Lotus" APT organization's attack techniques against China in the first quarter of 2019 revealed Cobalt Strike SOUNDBITE |
| 2019-04-24
⋅
Symantec
⋅
Beapy: Cryptojacking Worm Hits Enterprises in China Beapy |
| 2019-04-24
⋅
SpecterOps
⋅
Introducing Venator: A macOS tool for proactive detection AppleJeus WindTail |
| 2019-04-23
⋅
Kaspersky Labs
⋅
Operation ShadowHammer: a high-profile supply chain attack shadowhammer ShadowPad |
| 2019-04-22
⋅
KrebsOnSecurity
⋅
Who’s Behind the RevCode WebMonitor RAT? WebMonitor RAT |
| 2019-04-22
⋅
int 0xcc blog
⋅
Dissecting Emotet’s network communication protocol Emotet |
| 2019-04-19
⋅
Cylance
⋅
OceanLotus Steganography |
| 2019-04-19
⋅
Medium
⋅
Hacking (Back) and Influence Operations BONDUPDATER |