Click here to download all references as Bib-File.•
2021-01-26
⋅
Medium 0xthreatintel
⋅
Reversing APT Tool : SManager (Unpacked) SManager |
2021-01-26
⋅
Proofpoint
⋅
New Year, New Version of DanaBot DanaBot |
2021-01-26
⋅
Kaspersky Labs
⋅
SunBurst industrial victims SUNBURST |
2021-01-25
⋅
Google
⋅
New campaign targeting security researchers ComeBacker DRATzarus |
2021-01-25
⋅
⋅
Cert-AgID
⋅
Individuato sito che veicola in Italia un APK malevolo Oscorp |
2021-01-25
⋅
xorl %eax
⋅
On attribution: APT28, APT29…Turla: No, they are NOT the same |
2021-01-25
⋅
Trend Micro
⋅
Fake Office 365 Used for Phishing Attacks on C-Suite Targets |
2021-01-25
⋅
CYBER GEEKS All Things Infosec
⋅
A detailed analysis of ELMER Backdoor used by APT16 ELMER |
2021-01-25
⋅
ZenGo
⋅
Ungilded Secrets: A New Paradigm for Key Security SUNBURST |
2021-01-25
⋅
SOC Prime
⋅
Affiliates vs Hunters: Fighting the DarkSide DarkSide |
2021-01-25
⋅
Medium CSIS Techblog
⋅
The Nemty affiliate model Nemty |
2021-01-25
⋅
Twitter (@IntelAdvanced)
⋅
Tweet on Ryuk Ransomware group's post exploitation tactics including usage of Keethief tool Ryuk |
2021-01-25
⋅
Netresec
⋅
Twenty-three SUNBURST Targets Identified SUNBURST |
2021-01-24
⋅
malwareandstuff blog
⋅
Catching Debuggers with Section Hashing |
2021-01-24
⋅
evotec
⋅
The only command you will ever need to understand and fix your Group Policies (GPO) |
2021-01-24
⋅
Darren’s Website
⋅
VisualDoor: SonicWall SSL-VPN Exploit |
2021-01-24
⋅
Medium vrieshd
⋅
Finding SUNBURST victims and targets by using passive DNS, OSINT SUNBURST |
2021-01-24
⋅
Medium nasbench
⋅
Common Tools & Techniques Used By Threat Actors and Malware — Part I |
2021-01-24
⋅
Bleeping Computer
⋅
Another ransomware (Avaddon) now uses DDoS attacks to force victims to pay Avaddon |
2021-01-23
⋅
Youtube (MalwareAnalysisForHedgehogs)
⋅
Malware Analysis - Fileless GooLoad static analysis and unpacking |