Click here to download all references as Bib-File.•
2020-02-03
⋅
Telekom
⋅
Dissecting Emotet – Part 1 Emotet |
2020-02-03
⋅
Dragos
⋅
EKANS Ransomware and ICS Operations Snake |
2020-02-03
⋅
Check Point Research
⋅
Warzone: Behind the enemy lines Ave Maria |
2020-02-02
⋅
ESET Research
⋅
TLP: WHITE A WILD KOBALOS APPEARSTricksy Linux malware goes after HPCs Kobalos |
2020-02-02
⋅
Sophos Labs
⋅
Agent Tesla amps up information stealing attacks Agent Tesla |
2020-02-02
⋅
Nullteilerfrei Blog
⋅
Defeating Sodinokibi/REvil String-Obfuscation in Ghidra REvil |
2020-02-02
⋅
uf0 Blog
⋅
Uncovering Mimikatz ‘msv’ and collecting credentials through PyKD MimiKatz |
2020-01-31
⋅
YouTube (Context Information Security)
⋅
New AVIVORE threat group – how they operate and managing the risk PlugX |
2020-01-31
⋅
Avira
⋅
New wave of PlugX targets Hong Kong PlugX |
2020-01-31
⋅
Virus Bulletin
⋅
Rich Headers: leveraging this mysterious artifact of the PE format Dridex Exaramel Industroyer Neutrino RCS Sathurbot |
2020-01-31
⋅
⋅
Tagesschau
⋅
Deutsches Chemieunternehmen gehackt Winnti |
2020-01-31
⋅
ESET Research
⋅
Winnti Group targeting universities in Hong Kong ShadowPad Winnti |
2020-01-30
⋅
Certfa Lab
⋅
Fake Interview: The New Activity of Charming Kitten Unidentified 073 (Charming Kitten) |
2020-01-30
⋅
Intezer
⋅
New Iranian Campaign Tailored to US Companies Utilizes an Updated Toolset TONEDEAF VALUEVAULT |
2020-01-30
⋅
Bleeping Computer
⋅
TrickBot Uses a New Windows 10 UAC Bypass to Launch Quietly TrickBot |
2020-01-30
⋅
Morphisec
⋅
Trickbot Trojan Leveraging a New Windows 10 UAC Bypass TrickBot |
2020-01-30
⋅
IBM X-Force Exchange
⋅
Coronavirus Goes Cyber With Emotet Emotet |
2020-01-30
⋅
Under The Breach
⋅
Tracking Down REvil’s “Lalartu” by utilizing multiple OSINT methods REvil |
2020-01-29
⋅
Twitter (@ViriBack)
⋅
Tweet on Borr Borr |
2020-01-28
⋅
⋅
Macnica Networks
⋅
Tick Group Aiming at Japanese Manufacturing Datper xxmm |