Click here to download all references as Bib-File.•
| 2021-06-16
⋅
Proofpoint
⋅
The First Step: Initial Access Leads to Ransomware BazarBackdoor Egregor IcedID Maze QakBot REvil Ryuk TrickBot WastedLocker TA570 TA575 TA577 |
| 2021-06-16
⋅
nur.pub
⋅
Cerberus Analysis - Android Banking Trojan Cerberus |
| 2021-06-16
⋅
The Record
⋅
Ukrainian police arrest Clop ransomware members, seize server infrastructure Clop |
| 2021-06-16
⋅
Advanced Intelligence
⋅
The Rise & Demise of Multi-Million Ransomware Business Empire Avaddon |
| 2021-06-15
⋅
vmware
⋅
Detecting UEFI Bootkits in the Wild (Part 1) LoJax MosaicRegressor TrickBot |
| 2021-06-15
⋅
Kaspersky
⋅
Andariel evolves to target South Korea with ransomware BISTROMATH PEBBLEDASH SHATTEREDGLASS TigerLite Tiger RAT |
| 2021-06-15
⋅
Silent Push
⋅
Infra-Tagging -a new tool in Cyber Threat Intelligence |
| 2021-06-15
⋅
PARAFLARE
⋅
A Defender's Perspective of SSL VPN Exploitation |
| 2021-06-15
⋅
⋅
ID Ransomware
⋅
TargetCompany Ransomware TargetCompany |
| 2021-06-15
⋅
Perception Point
⋅
Insights Into an Excel 4.0 Macro Attack using Qakbot Malware QakBot |
| 2021-06-15
⋅
The Record
⋅
Source code for Paradise ransomware leaked on hacking forums Paradise |
| 2021-06-15
⋅
ICRC
⋅
Avoiding Civilian Harm from Military Cyber Operations during Armed Conflicts |
| 2021-06-15
⋅
Vice
⋅
Ransomware Gang Turns to Revenge Porn |
| 2021-06-15
⋅
Tenable
⋅
How to Protect Active Directory Against Ransomware Attacks |
| 2021-06-15
⋅
⋅
360 Threat Intelligence Center
⋅
PJobRAT: Spyware targeting Indian military personnel PjobRAT |
| 2021-06-15
⋅
Trend Micro
⋅
Ransomware Double Extortion and Beyond: REvil, Clop, and Conti Clop Conti REvil |
| 2021-06-15
⋅
Nextron Systems
⋅
Use YARA math Module Extension in THOR TechPreview and THOR Lite |
| 2021-06-15
⋅
Elastic
⋅
What you need to know about Process Ghosting, a new executable image tampering attack |
| 2021-06-15
⋅
Secureworks
⋅
Hades Ransomware Operators Use Distinctive Tactics and Infrastructure Cobalt Strike Hades |
| 2021-06-15
⋅
NCC Group
⋅
Handy guide to a new Fivehands ransomware variant FiveHands |