Click here to download all references as Bib-File.•
2021-07-01
⋅
Avast Decoded
⋅
Backdoored Client from Mongolian CA MonPass Cobalt Strike Earth Lusca |
2021-07-01
⋅
Avast Decoded
⋅
Backdoored Client from Mongolian CA MonPass Cobalt Strike FishMaster |
2021-07-01
⋅
Fortinet
⋅
Diavol - A New Ransomware Used By Wizard Spider? Conti Diavol |
2021-07-01
⋅
Check Point
⋅
IndigoZebra APT continues to attack Central Asia with evolving tools BoxCaon xCaon IndigoZebra |
2021-07-01
⋅
Anheng Threat Intelligence Center
⋅
Suspected HADES organization launched an attack on Ukraine with military themes |
2021-07-01
⋅
DomainTools
⋅
The Most Prolific Ransomware Families: A Defenders Guide REvil Conti Egregor Maze REvil |
2021-07-01
⋅
Quick Heal
⋅
WARZONE RAT – Beware Of The Trojan Malware Stealing Data Triggering From Various Office Documents Ave Maria |
2021-07-01
⋅
Kryptos Logic
⋅
TrickBot and Zeus TrickBot Zeus |
2021-07-01
⋅
360 netlab
⋅
Mirai_ptea Botnet is Exploiting Undisclosed KGUARD DVR Vulnerability Mirai |
2021-07-01
⋅
Proofpoint
⋅
Malware Masquerades as Privacy Tool |
2021-07-01
⋅
Dr.Web
⋅
Android trojans steal Facebook users’ logins and passwords |
2021-07-01
⋅
Russian GRU (APT28) Conducting Global Brute Force Campaign to Compromise Enterprise and Cloud Environments reGeorg |
2021-07-01
⋅
The Record
⋅
Mongolian certificate authority hacked eight times, compromised with malware Cobalt Strike |
2021-07-01
⋅
AT&T Cybersecurity
⋅
REvil’s new Linux version REvil REvil |
2021-07-01
⋅
Threatpost
⋅
Linux Variant of REvil Ransomware Targets VMware’s ESXi, NAS Devices REvil |
2021-07-01
⋅
BleepingComputer
⋅
Babuk ransomware is back, uses new version on corporate networks Babuk |
2021-07-01
⋅
Trend Micro
⋅
PurpleFox Using WPAD to Target Indonesian Users PurpleFox |
2021-06-30
⋅
Sophos SecOps
⋅
What to expect when you’ve been hit with REvil ransomware REvil |
2021-06-30
⋅
Cynet
⋅
Shelob Moonlight – Spinning a Larger Web From IcedID to CONTI, a Trojan and Ransomware collaboration Conti IcedID |
2021-06-30
⋅
synthesis.to blog
⋅
Automation in Reverse Engineering: String Decryption Mirai |