Click here to download all references as Bib-File.•
2021-04-27
⋅
Positive Technologies
⋅
Lazarus Group Recruitment: Threat Hunters vs Head Hunters |
2021-04-27
⋅
DomainTools
⋅
Winter Vivern: A Look At Re-Crafted Government MalDocs Targeting Multiple Languages Winter Vivern |
2021-04-27
⋅
FireEye
⋅
Abusing Replication: Stealing AD FS Secrets Over the Network |
2021-04-26
⋅
The Record
⋅
Despite arrests in Spain, FluBot operations explode across Europe and Japan FluBot |
2021-04-26
⋅
⋅
Medium testbnull
⋅
Microsoft Exchange From Deserialization to Post-Auth RCE (CVE-2021–28482) |
2021-04-26
⋅
CoveWare
⋅
Ransomware Attack Vectors Shift as New Software Vulnerability Exploits Abound Avaddon Clop Conti DarkSide Egregor LockBit Mailto Phobos REvil Ryuk SunCrypt |
2021-04-26
⋅
Juniper
⋅
Linux Servers Hijacked to Implant SSH Backdoor |
2021-04-26
⋅
Dragos
⋅
New ICS Threat Activity Group: TALONITE FlowCloud Lookback |
2021-04-26
⋅
Intel 471
⋅
The cybercriminal underground hasn’t forgotten about financial services |
2021-04-26
⋅
Jamf Blog
⋅
Shlayer malware abusing Gatekeeper bypass on macOS Shlayer |
2021-04-26
⋅
Objective-See
⋅
All Your Macs Are Belong To Us: bypassing macOS's file quarantine, gatekeeper, and notarization requirements Shlayer |
2021-04-26
⋅
nviso
⋅
Anatomy of Cobalt Strike’s DLL Stager Cobalt Strike |
2021-04-26
⋅
getrevue
⋅
Hunting Cobalt Strike DNS redirectors by using ZoomEye Cobalt Strike |
2021-04-26
⋅
CISA
⋅
Russian Foreign Intelligence Service (SVR)Cyber Operations: Trends and Best Practices for Network Defenders elf.wellmess WellMess |
2021-04-25
⋅
BBC
⋅
2. Disaster movie |
2021-04-25
⋅
The Record
⋅
Hacking campaign targets FileZen file-sharing network appliances |
2021-04-25
⋅
Vulnerability.ch Blog
⋅
Ransomware and Data Leak Site Publication Time Analysis Avaddon Babuk Clop Conti DarkSide DoppelPaymer Mespinoza Nefilim REvil |
2021-04-25
⋅
Nightwatch Cybersecurity
⋅
Supply Chain Attacks via GitHub.com Releases |
2021-04-25
⋅
wire
⋅
VPN Hacks Are a Slow-Motion Disaster |
2021-04-24
⋅
xorl %eax, %eax
⋅
North Korea (DPRK) Cyber Operations Groups |