Click here to download all references as Bib-File.•
2024-06-20
⋅
Red Canary
⋅
Gourav Khandelwal, Akash Chaudhuri, Matthew Mesa, Sagar Patil, Uri Oren, Krithika Ramakrishnan UNC4393 |
2024-06-17
⋅
splunk
⋅
LNK or Swim: Analysis & Simulation of Recent LNK Phishing |
2024-06-12
⋅
Symantec
⋅
Ransomware Attackers May Have Used Privilege Escalation Vulnerability as Zero-day Black Basta UNC4393 |
2024-06-12
⋅
⋅
Gatewatcher
⋅
Nova Stealer, le malware made in France Nova Stealer |
2024-06-12
⋅
Symantec
⋅
Ransomware Attackers May Have Used Privilege Escalation Vulnerability as Zero-day Black Basta |
2024-06-11
⋅
Zscaler
⋅
A Brief History of SmokeLoader, Part 1 SmokeLoader |
2024-06-04
⋅
Qianxin
⋅
Operation Veles: Decade-Long Espionage Targeting the Global Research and Education Sector UTG-Q-008 |
2024-06-03
⋅
SYGNIA
⋅
China-Nexus Threat Group ‘Velvet Ant’ Abuses F5 Load Balancers for Persistence PlugX |
2024-05-28
⋅
Reliaquest
⋅
BlackSuit Attack Analysis BlackSuit |
2024-05-16
⋅
Symantec
⋅
Springtail: New Linux Backdoor Added to Toolkit Gomir Kimsuky |
2024-05-11
⋅
Russian APT deploys new 'Kapeka' backdoor in Eastern European attacks Kapeka |
2024-05-01
⋅
Natto Thoughts
⋅
Ransom-War: Russian Extortion Operations as Hybrid Warfare, Part One Clop Conti Maze TrickBot |
2024-04-29
⋅
ThreatMon
⋅
Understanding the 'Kapeka' Backdoor: Detailed Analysis by APT44 Kapeka |
2024-04-25
⋅
Microsoft
⋅
Guidance for Incident Responders |
2024-04-19
⋅
TEAMT5
⋅
Chinese APT: A Master of Exploiting Edge Devices SEASPY UNC4841 |
2024-04-19
⋅
ThreatMon
⋅
APT44: The Famous Sandworm of Russia |
2024-04-09
⋅
Claroty
⋅
Unpacking the Blackjack Group's Fuxnet Malware BlackJack |
2024-04-04
⋅
Proofpoint
⋅
Latrodectus: This Spider Bytes Like Ice IcedID Latrodectus |
2024-03-21
⋅
Proofpoint
⋅
Security Brief: TA450 Uses Embedded Links in PDF Attachments in Latest Campaign |
2024-03-05
⋅
Team Cymru
⋅
Coper / Octo - A Conductor for Mobile Mayhem… With Eight Limbs? Coper |