Click here to download all references as Bib-File.•
2021-05-06
⋅
Black Hat
⋅
Threat Hunting in Active Directory Environment |
2021-05-06
⋅
Tencent
⋅
Domain Borrowing: Catch My C2 Traffic if You Can |
2021-05-06
⋅
Tencent
⋅
Domain Borrowing: Catch My C2 Traffic if You Can |
2021-05-06
⋅
Black Hat
⋅
How Did the Adversaries Abusing Bitcoin Blockchain Evade Our Takeover Cerber Pony |
2021-05-06
⋅
Group-IB
⋅
GrelosGTM group abuses Google Tag Manager to attack e-commerce websites |
2021-05-06
⋅
Sophos Labs
⋅
MTR in Real Time: Pirates pave way for Ryuk ransomware Ryuk |
2021-05-06
⋅
Chuongdong blog
⋅
Darkside Ransomware DarkSide |
2021-05-06
⋅
Chuongdong blog
⋅
Darkside Ransomware DarkSide |
2021-05-06
⋅
Facebook
⋅
April 2021 Coordinated Inauthentic Behavior Report |
2021-05-06
⋅
Cyborg Security
⋅
Ransomware: Hunting for Inhibiting System Backup or Recovery Avaddon Conti DarkSide LockBit Mailto Maze Mespinoza Nemty PwndLocker RagnarLocker RansomEXX REvil Ryuk Snatch ThunderX |
2021-05-06
⋅
Twitter (@SyscallE)
⋅
Tweet on short analysis of Nebulae Backdoor Nebulae |
2021-05-06
⋅
Blackberry
⋅
Threat Thursday: Dr. REvil Ransomware Strikes Again, Employs Double Extortion Tactics REvil |
2021-05-06
⋅
CISA
⋅
MAR-10324784-1.v1: FiveHands Ransomware FiveHands |
2021-05-06
⋅
CISA
⋅
Analysis Report: FiveHands Ransomware FiveHands |
2021-05-06
⋅
Intrusiontruth
⋅
An APT with no name |
2021-05-06
⋅
The Finnish Defense Forces
⋅
Finnish Military Intelligence Review 2021 |
2021-05-06
⋅
xorl %eax, %eax
⋅
Iran Cyber Operations Groups Cleaver |
2021-05-06
⋅
Kaspersky
⋅
Operation TunnelSnake Moriya TunnelSnake |
2021-05-06
⋅
MIT Technology Review
⋅
How China turned a prize-winning iPhone hack against the Uyghurs |
2021-05-06
⋅
360 netlab
⋅
RotaJakiro, the Linux version of the OceanLotus RotaJakiro |