Click here to download all references as Bib-File.•
2022-03-23
⋅
Mandiant
⋅
Not So Lazarus: Mapping DPRK Cyber Threat Groups to Government Organizations |
2022-03-21
⋅
IEEE
⋅
Dynamics of Targeted Ransomware Negotiation |
2022-03-17
⋅
Trellix
⋅
Suspected DarkHotel APT activity update RMOT |
2022-03-15
⋅
SecurityIntelligence
⋅
CaddyWiper: Third Wiper Malware Targeting Ukrainian Organizations CaddyWiper |
2022-03-08
⋅
Mandiant
⋅
Does This Look Infected? A Summary of APT41 Targeting U.S. State Governments KEYPLUG Cobalt Strike LOWKEY |
2022-03-04
⋅
IBM
⋅
New Wiper Malware Used Against Ukranian Organizations IsaacWiper |
2022-03-01
⋅
Huntress Labs
⋅
Targeted APT Activity: BABYSHARK Is Out for Blood BabyShark |
2022-02-24
⋅
IBM
⋅
IBM Security X-Force Research Advisory: New Destructive Malware Used In Cyber Attacks on Ukraine HermeticWiper |
2022-02-18
⋅
YouTube (John Hammond)
⋅
Uncovering NETWIRE Malware - Discovery & Deobfuscation NetWire RC |
2022-01-27
⋅
Recorded Future
⋅
Russia’s Biggest Threat Is Its Instability WhisperGate |
2022-01-20
⋅
BrightTALK (Mandiant)
⋅
Anticipating and Preparing for Russian Cyber Activity |
2022-01-20
⋅
Mandiant
⋅
Anticipating Cyber Threats as the Ukraine Crisis Escalates |
2022-01-04
⋅
The Cyber Security Times
⋅
Purple Fox malware is actively distributed via Telegram Installers PurpleFox |
2021-12-16
⋅
CitizenLab
⋅
Pegasus vs. Predator: Dissident's Doubly-Infected iPhone Reveals Cytrox Mercenary Spyware Chrysaor Caramel Tsunami |
2021-12-15
⋅
Mandiant
⋅
Log4Shell Initial Exploitation and Mitigation Recommendations |
2021-11-10
⋅
Microsoft
⋅
The hunt for NOBELIUM, the most sophisticated nation-state attack in history |
2021-11-07
⋅
McAfee
⋅
Who Will Bend the Knee in RaaS Game of Thrones in 2022? |
2021-10-24
⋅
CitizenLab
⋅
Breaking the News New York Times Journalist Ben Hubbard Hacked with Pegasus after Reporting on Previous Hacking Attempts Chrysaor |
2021-09-22
⋅
YouTube (John Hammond)
⋅
Snip3 Crypter/RAT Loader - DcRat MALWARE ANALYSIS DCRat |
2021-09-14
⋅
Fortinet
⋅
More ProxyShell? Web Shells Lead to ZeroLogon and Application Impersonation Attacks |