Click here to download all references as Bib-File.•
2021-05-26
⋅
Check Point
⋅
Melting Ice – Tracking IcedID Servers with a few simple steps IcedID |
2021-05-26
⋅
InQuest
⋅
PSChain |
2021-05-26
⋅
RiskIQ
⋅
The MobileInter Skimmer: Hosted by Google, Hiding in Images |
2021-05-25
⋅
SentinelOne
⋅
From Wiper to Ransomware: The Evolution of Agrius Apostle DEADWOOD |
2021-05-25
⋅
Trend Micro
⋅
TeamTNT Targets Kubernetes, Nearly 50,000 IPs Compromised in Worm-like Attack |
2021-05-25
⋅
Kaspersky
⋅
Evolution of JSWorm ransomware Nefilim Nemty |
2021-05-25
⋅
lacework
⋅
Taking TeamTNT’s Docker Images Offline |
2021-05-25
⋅
Medium s2wlab
⋅
W4 May | EN | Story of the week: Ransomware on the Darkweb Babuk REvil |
2021-05-25
⋅
FireEye
⋅
Crimes of Opportunity: Increasing Frequency of Low Sophistication Operational Technology Compromises |
2021-05-25
⋅
DomainTools
⋅
Indicators Over Cocktails: Exporting Indicators from Iris (UNC1151) |
2021-05-25
⋅
Huntress Labs
⋅
Cobalt Strikes Again: An Analysis of Obfuscated Malware Cobalt Strike |
2021-05-25
⋅
Hydra: Where The Crypto Money Laundering Trail Goes Dark |
2021-05-24
⋅
VinCSS
⋅
[RE022] Part 1: Quick analysis of malicious sample forging the official dispatch of the Central Inspection Committee 5.t Downloader |
2021-05-24
⋅
AhnLab
⋅
Vidar Info-Stealer Abusing Game Platform Vidar |
2021-05-24
⋅
Anchored Narratives on Threat Intelligence and Geopolitics
⋅
Tracking StrongPity with Yara StrongPity |
2021-05-24
⋅
Atlantic Council
⋅
SCOTCH: A framework for rapidly assessing influence operations |
2021-05-24
⋅
⋅
Medium s2wlab
⋅
Deep Analysis of Raccoon Stealer Raccoon |
2021-05-24
⋅
MIT Technology Review
⋅
The Colonial pipeline ransomware hackers had a secret weapon: self-promoting cybersecurity firms DarkSide DarkSide |
2021-05-24
⋅
Jamf Blog
⋅
Zero-Day TCC bypass discovered in XCSSET malware XCSSET |
2021-05-23
⋅
Chuongdong blog
⋅
MountLocker Ransomware Mount Locker |