Click here to download all references as Bib-File.•
2020-03-18
⋅
Morphisec
⋅
Parallax: The new RAT on the block Parallax RAT |
2020-03-18
⋅
Bitdefender
⋅
New TrickBot Module Bruteforces RDP Connections, Targets Select Telecommunication Services in US and Hong Kong TrickBot |
2020-03-18
⋅
RiskIQ
⋅
Magecart Group 8 Blends into NutriBullet.com Adding To Their Growing List of Victims magecart |
2020-03-17
⋅
⋅
ProLock Ransomware |
2020-03-16
⋅
Mandiant
⋅
They Come in the Night: Ransomware Deployment Trends FAKEUPDATES |
2020-03-16
⋅
Medium Asuna Amawaka
⋅
Shadows in the Rain BBSRAT |
2020-03-16
⋅
Proofpoint
⋅
TA505 and Others Launch New Coronavirus Campaigns; Now the Largest Collection of Attack Types in Years RedLine Stealer |
2020-03-15
⋅
Twitter (@TheEnergyStory)
⋅
GuLoader anti analysis/sandbox tricks CloudEyE |
2020-03-15
⋅
insomniacs(Medium)
⋅
Dad! There’s A Rat In Here! DADSTACHE |
2020-03-14
⋅
⋅
ID Ransomware
⋅
RekenSom Ransomware RekenSom |
2020-03-12
⋅
Recorded Future
⋅
Swallowing the Snake’s Tail: Tracking Turla Infrastructure TwoFace Mosquito |
2020-03-12
⋅
Amnesty International
⋅
Targeted Surveillance Attacks in Uzbekistan: An Old Threat with New Techniques Void Balaur |
2020-03-12
⋅
Check Point Research
⋅
Vicious Panda: The COVID Campaign 8.t Dropper Vicious Panda |
2020-03-12
⋅
⋅
ID Ransomware
⋅
Teslarvng Ransomware Yakuza Ransomware Yakuza |
2020-03-12
⋅
Digital Shadows
⋅
How cybercriminals are taking advantage of COVID-19: Scams, fraud, and misinformation Emotet |
2020-03-12
⋅
Check Point
⋅
Vicious Panda: The COVID Campaign 8.t Dropper BYEBY Enfal Korlia Poison Ivy |
2020-03-12
⋅
ESET Research
⋅
Tracking Turla: New backdoor delivered via Armenian watering holes LightNeuron Mosquito NetFlash Skipper |
2020-03-12
⋅
Recorded Future
⋅
Swallowing the Snake’s Tail: Tracking Turla Infrastructure Mosquito Sinowal |
2020-03-11
⋅
Trend Micro
⋅
Pawn Storm in 2019: A Year of Scanning and Credential Phishing on High-Profile Targets |
2020-03-11
⋅
Virus Bulletin
⋅
Attribution is in the object: using RTF object dimensions to track APT phishing weaponizers 8.t Dropper |