Click here to download all references as Bib-File.•
2021-07-15
⋅
Twitter (@ESETresearch)
⋅
Tweet on FreeBSD targeted with Golang backdoor |
2021-07-15
⋅
⋅
AhnLab
⋅
APT attack (by Kimsuky) attempt on a specific person using a word document |
2021-07-15
⋅
YouTube ( DuMp-GuY TrIcKsTeR)
⋅
Fast API resolving of REvil Ransomware related to Kaseya attack REvil |
2021-07-15
⋅
CitizenLab
⋅
Hooking Candiru Another Mercenary Spyware Vendor Comes into Focus Chainshot |
2021-07-15
⋅
Microsoft
⋅
Fighting cyberweapons built by private businesses |
2021-07-15
⋅
Microsoft
⋅
Protecting customers from a private-sector offensive actor using 0-day exploits and DevilsTongue malware |
2021-07-15
⋅
Palo Alto Networks Unit 42
⋅
Mespinoza Ransomware Gang Calls Victims “Partners,” Attacks with Gasket, "MagicSocks" Tools Gasket Mespinoza |
2021-07-15
⋅
Recorded Future
⋅
Threats to the 2020 Tokyo Olympic Games |
2021-07-15
⋅
ISA
⋅
What is Cyber Threat Intelligence? |
2021-07-15
⋅
ReversingLabs
⋅
Data Exfiltrator - A New Tactic for Ransomware Adversaries DataExfiltrator |
2021-07-15
⋅
Facebook
⋅
Taking Action Against Hackers in Iran Liderc SysKit |
2021-07-14
⋅
Intel 471
⋅
How cybercriminals create turbulence for the transportation industry Mount Locker Nefilim |
2021-07-14
⋅
Google
⋅
How We Protect Users From 0-Day Attacks (CVE-2021-21166, CVE-2021-30551, CVE-2021-33742, CVE-2021-1879) Cobalt Strike |
2021-07-14
⋅
Bleeping Computer
⋅
BazarBackdoor sneaks in through nested RAR and ZIP archives BazarBackdoor |
2021-07-14
⋅
Cerium Networks
⋅
Threat of the Month: IcedID Malware IcedID |
2021-07-14
⋅
RiskIQ
⋅
Bulletproof Hosting Services: Investigating Media Land LLC, Part 2 |
2021-07-14
⋅
Bitdefender
⋅
How We Tracked a Threat Group Running an Active Cryptojacking Campaign |
2021-07-14
⋅
Medium TowardsDataScience
⋅
Domain Blooms: Identifying Domain Name Themes Targeted By Threat Actors |
2021-07-14
⋅
Microsoft
⋅
Microsoft delivers comprehensive solution to battle rise in consent phishing emails |
2021-07-14
⋅
BC SECURITY
⋅
XLS Entanglement |