Click here to download all references as Bib-File.•
2021-05-26
⋅
DeepInstinct
⋅
A Deep Dive into Packing Software CryptOne Cobalt Strike Dridex Emotet Gozi ISFB Mailto QakBot SmokeLoader WastedLocker Zloader |
2021-05-26
⋅
Cisco Talos
⋅
Elizabethan England has nothing on modern-day Russia |
2021-05-26
⋅
Facebook
⋅
Threat Report: The State of Influence Operations 2017-2020 |
2021-05-26
⋅
CyberScoop
⋅
Belgium uproots cyber-espionage campaign with suspected ties to China |
2021-05-26
⋅
Check Point
⋅
Melting Ice – Tracking IcedID Servers with a few simple steps IcedID |
2021-05-26
⋅
InQuest
⋅
PSChain |
2021-05-26
⋅
RiskIQ
⋅
The MobileInter Skimmer: Hosted by Google, Hiding in Images |
2021-05-25
⋅
SentinelOne
⋅
From Wiper to Ransomware: The Evolution of Agrius Apostle DEADWOOD |
2021-05-25
⋅
Trend Micro
⋅
TeamTNT Targets Kubernetes, Nearly 50,000 IPs Compromised in Worm-like Attack |
2021-05-25
⋅
Kaspersky
⋅
Evolution of JSWorm ransomware Nefilim Nemty |
2021-05-25
⋅
lacework
⋅
Taking TeamTNT’s Docker Images Offline |
2021-05-25
⋅
Medium s2wlab
⋅
W4 May | EN | Story of the week: Ransomware on the Darkweb Babuk REvil |
2021-05-25
⋅
FireEye
⋅
Crimes of Opportunity: Increasing Frequency of Low Sophistication Operational Technology Compromises |
2021-05-25
⋅
DomainTools
⋅
Indicators Over Cocktails: Exporting Indicators from Iris (UNC1151) |
2021-05-25
⋅
Huntress Labs
⋅
Cobalt Strikes Again: An Analysis of Obfuscated Malware Cobalt Strike |
2021-05-25
⋅
Hydra: Where The Crypto Money Laundering Trail Goes Dark |
2021-05-24
⋅
VinCSS
⋅
[RE022] Part 1: Quick analysis of malicious sample forging the official dispatch of the Central Inspection Committee 5.t Downloader |
2021-05-24
⋅
AhnLab
⋅
Vidar Info-Stealer Abusing Game Platform Vidar |
2021-05-24
⋅
Anchored Narratives on Threat Intelligence and Geopolitics
⋅
Tracking StrongPity with Yara StrongPity |
2021-05-24
⋅
Atlantic Council
⋅
SCOTCH: A framework for rapidly assessing influence operations |