Click here to download all references as Bib-File.•
2021-09-14
⋅
McAfee
⋅
Operation ‘Harvest’: A Deep Dive into a Long-term Campaign MimiKatz PlugX Winnti |
2021-09-14
⋅
CSO Online
⋅
Russia is fully capable of shutting down cybercrime |
2021-09-01
⋅
YouTube (Black Hat)
⋅
How Did the Adversaries Abusing the Bitcoin Blockchain Evade Our Takeover? Cerber Pony |
2021-08-26
⋅
The New York Times
⋅
Spies for Hire: China’s New Breed of Hackers Blends Espionage and Entrepreneurship |
2021-08-17
⋅
IBM X-Force Exchange
⋅
Analysis of Diavol Ransomware Reveals Possible Link to TrickBot Gang Diavol |
2021-07-29
⋅
Talos Intelligence
⋅
Talos Spotlight: Solarmarker solarmarker |
2021-07-21
⋅
IBM
⋅
This Chat is Being Recorded: Egregor Ransomware Negotiations Uncovered Egregor |
2021-07-19
⋅
CrowdStrike
⋅
Shlayer Malvertising Campaigns Still Using Flash Update Disguise Shlayer |
2021-07-14
⋅
MDSec
⋅
Investigating a Suspicious Service Cobalt Strike |
2021-07-14
⋅
Cado Security
⋅
Triage analysis of Serv-U FTP user backdoor deployed by CVE-2021-35211 (DEV-0322) |
2021-07-13
⋅
Cado Security
⋅
Resources for Investigating Cloud and Container Penetration Testing Tools |
2021-06-29
⋅
YouTube (C. Beek)
⋅
Demo of REvil/Sodinokibi Linux variant encrypting a Linux system REvil |
2021-06-10
⋅
lacework
⋅
Keksec & Tsunami-Ryuk N3Cr0m0rPh |
2021-05-20
⋅
lacework
⋅
8220 Gangs Recent use of Custom Miner and Botnet |
2021-05-14
⋅
McAfee
⋅
Darkside Ransomware Victims Sold Short DarkSide |
2021-05-08
⋅
Reuters
⋅
Cyber attack shuts down top U.S. fuel pipeline network DarkSide |
2021-05-06
⋅
Black Hat
⋅
How Did the Adversaries Abusing Bitcoin Blockchain Evade Our Takeover Cerber Pony |
2021-05-04
⋅
Lacework Labs
⋅
Cpuminer & Friends |
2021-04-22
⋅
lacework
⋅
Sysrv-Hello Expands Infrastructure Sysrv-hello |
2021-04-20
⋅
FireEye
⋅
Zero-Day Exploits in SonicWall Email Security Lead to Enterprise Compromise |