Click here to download all references as Bib-File.•
2021-01-04
⋅
KELA
⋅
Darknet Threat Actors Are Not Playing Games with the Gaming Industry REvil |
2021-01-04
⋅
splunk
⋅
Detecting Supernova Malware: SolarWinds Continued SUPERNOVA |
2021-01-04
⋅
Profero
⋅
APT27 Turns to Ransomware Clambling |
2021-01-04
⋅
nao_sec blog
⋅
Royal Road! Re:Dive 8.t Dropper Chinoxy FlowCloud FunnyDream Lookback |
2021-01-04
⋅
Morphisec
⋅
Threat Profile the Evolution of the FIN7 JSSLoader JSSLoader |
2021-01-04
⋅
Netresec
⋅
Finding Targeted SUNBURST Victims with pDNS SUNBURST |
2021-01-04
⋅
Check Point
⋅
DRIDEX Stopping Serial Killer: Catching the Next Strike Dridex |
2021-01-04
⋅
Bleeping Computer
⋅
TransLink confirms ransomware data theft, still restoring systems Egregor |
2021-01-04
⋅
Medium haggis-m
⋅
Malleable C2 Profiles and You Cobalt Strike |
2021-01-03
⋅
Chuongdong blog
⋅
Babuk Ransomware Babuk |
2021-01-03
⋅
⋅
EST Security
⋅
Thallium organization exploits private stock investment messenger to attack software supply chain |
2021-01-02
⋅
The Wall Street Journal
⋅
How Russia’s ‘Info Warrior’ Hackers Let Kremlin Play Geopolitics on the Cheap |
2021-01-02
⋅
The New York Times
⋅
As Understanding of Russian Hacking Grows, So Does Alarm |
2021-01-02
⋅
Twitter (MalwareHunterTeam)
⋅
Tweet on Knot Ransomware Knot |
2021-01-01
⋅
Secureworks
⋅
GOLD PRELUDE GOLD PRELUDE |
2021-01-01
⋅
AWAKE
⋅
Breaking the Ice: Detecting IcedID and Cobalt Strike Beacon with Network Detection and Response (NDR) Cobalt Strike IcedID PhotoLoader |
2021-01-01
⋅
lodestone
⋅
White Rabbit Ransomware and the F5 Backdoor |
2021-01-01
⋅
Symantec
⋅
Supply Chain Attacks:Cyber Criminals Target the Weakest Link Cobalt Strike Raindrop SUNBURST TEARDROP |
2021-01-01
⋅
⋅
Github (WBGlIl)
⋅
A book on cobaltstrike Cobalt Strike |
2021-01-01
⋅
Acronis
⋅
Taking Deep Dive into Sodinokibi Ransomware REvil |