Click here to download all references as Bib-File.•
2021-06-29
⋅
Medium MITRE-Engenuity
⋅
Security Control Mappings: A Starting Point for Threat-Informed Defense |
2021-06-29
⋅
Twitter (@sisoma2)
⋅
Tweet on vidar stealer using Tumblr to obtain dynamic config Vidar |
2021-06-29
⋅
Accenture
⋅
HADES ransomware operators continue attacks Cobalt Strike Hades MimiKatz |
2021-06-29
⋅
The Record
⋅
Free decrypter available for Lorenz ransomware Lorenz |
2021-06-29
⋅
Silverado Policy Accelerator
⋅
Cyber Strategy in the Biden Era: A Conversation with Anne Neuberger |
2021-06-29
⋅
⋅
VERSION2
⋅
Danmarks National Bank hacked as part of 'the world's most sophisticated hacker attack' (NOBELIUM) |
2021-06-29
⋅
YouTube (C. Beek)
⋅
Demo of REvil/Sodinokibi Linux variant encrypting a Linux system REvil |
2021-06-29
⋅
Twitter (@VK_intel)
⋅
Tweet on Linux version of REvil ransomware REvil |
2021-06-29
⋅
Proofpoint
⋅
Cobalt Strike: Favorite Tool from APT to Crimeware Cobalt Strike |
2021-06-29
⋅
Yoroi
⋅
The "WayBack” Campaign: a Large Scale Operation Hiding in Plain Sight Agent Tesla Cobian RAT Oski Stealer |
2021-06-28
⋅
AhnLab
⋅
CryptBot Info-stealer Malware Being Distributed in Different Forms CryptBot |
2021-06-28
⋅
⋅
CN CERT
⋅
Analysis of the new P2P botnet PBot pbot |
2021-06-28
⋅
Github (Finch4)
⋅
Delta Ransomware Analysis |
2021-06-28
⋅
Malwarebytes
⋅
Lil' skimmer, the Magecart impersonator - Malwarebytes Labs magecart |
2021-06-28
⋅
Vice Motherboard
⋅
Hackers Tricked Microsoft Into Certifying Malware That Could Spy on Users NetfilterRootkit |
2021-06-28
⋅
Trend Micro
⋅
Nefilim Ransomware Attack Through a MITRE Att&ck Lens Nefilim |
2021-06-28
⋅
Konrad Adenauer Stiftung
⋅
Outward Defense: Comparing the Cyber Defense Postures of Japan, the Netherlands and the United States in Peace Time |
2021-06-28
⋅
AT&T
⋅
REvil ransomware Linux version (with YARA rule) REvil |
2021-06-28
⋅
Twitter (@AdamTheAnalyst)
⋅
Tweet on suspected REvil exfiltration (over RClone FTP) server REvil REvil |
2021-06-28
⋅
HP
⋅
Snake Keylogger’s Many Skins: Analysing Code Reuse Among Infostealers 404 Keylogger Phoenix Keylogger |