Click here to download all references as Bib-File.•
2021-07-28
⋅
Corelight
⋅
Telegram Zeek, you’re my main notice |
2021-07-28
⋅
DomainTools
⋅
Finding AnchorDNS C2s With Iris Investigate AnchorDNS |
2021-07-28
⋅
Prevailion
⋅
Cert Safari: Leveraging TLS Certificates to Hunt Evil |
2021-07-28
⋅
RiskIQ
⋅
Use of XAMPP Web Component to Identify Agent Tesla Infrastructure Agent Tesla |
2021-07-28
⋅
SUCURI
⋅
Stylish Magento Card Stealer loads Without Script Tags |
2021-07-28
⋅
KELA
⋅
New Russian-Speaking Forum – A New Place for RaaS? Babuk |
2021-07-28
⋅
McAfee
⋅
Babuk: Moving to VM and *nix Systems Before Stepping Away Babuk |
2021-07-28
⋅
CISA
⋅
Top Routinely Exploited Vulnerabilities |
2021-07-28
⋅
Proofpoint
⋅
I Knew You Were Trouble: TA456 Targets Defense Contractor with Alluring Social Media Persona Liderc SysKit |
2021-07-27
⋅
Bitdefender
⋅
Deep dive into a FIN8 attack – A forensic investigation |
2021-07-27
⋅
Trend Micro
⋅
Threat Actors Exploit Misconfigured Apache Hadoop YARN Kinsing |
2021-07-27
⋅
ZAYOTEM
⋅
Diamondfox Technical Analysis Report DiamondFox |
2021-07-27
⋅
ZAYOTEM
⋅
DarkSide Ransomware Technical Analysis Report DarkSide |
2021-07-27
⋅
ZAYOTEM
⋅
Oski Stealer Technical Analysis Report Oski Stealer |
2021-07-27
⋅
Twitter (@fwosar)
⋅
Tweet on new REvil variant REvil |
2021-07-27
⋅
Flashpoint
⋅
Chatter Indicates BlackMatter as REvil Successor REvil |
2021-07-27
⋅
Youtube (SANS Institute)
⋅
SANS Threat Analysis Rundown - Kaseya VSA attack REvil |
2021-07-27
⋅
Gigamon
⋅
Ghosts on the Wire: Expanding Conceptions of Network Anomalies SUNBURST |
2021-07-27
⋅
Recorded Future
⋅
China’s Digital Colonialism: Espionage and Repression Along the Digital Silk Road |
2021-07-27
⋅
Palo Alto Networks Unit 42
⋅
THOR: Previously Unseen PlugX Variant Deployed During Microsoft Exchange Server Attacks by PKPLUG Group PlugX |