Click here to download all references as Bib-File.•
2021-01-28
⋅
K7 Security
⋅
Osno – A Stealer and a Miner in One Osno |
2021-01-28
⋅
YouTube (Microsoft Security Community)
⋅
Microsoft 365 Defender webinar: Protect, Detect, and Respond to Solorigate using M365 Defender SUNBURST |
2021-01-28
⋅
0xC0DECAFE
⋅
Learn how to fix PE magic numbers with Malduck |
2021-01-28
⋅
⋅
AhnLab
⋅
BlueCrab ransomware constantly trying to bypass detection Cobalt Strike REvil |
2021-01-28
⋅
Check Point
⋅
Deep into the SunBurst Attack SUNBURST |
2021-01-28
⋅
Department of Homeland Security
⋅
Emotet Botnet Disrupted in International Cyber Operation Emotet |
2021-01-28
⋅
Youtube (Virus Bulletin)
⋅
The Bagsu banker case Azorult DreamBot Emotet Pony TrickBot ZeusAction |
2021-01-28
⋅
Huntress Labs
⋅
Analyzing Ryuk Another Link in the Cyber Attack Chain BazarBackdoor Ryuk |
2021-01-28
⋅
NTT
⋅
Emotet disruption - Europol counterattack Emotet |
2021-01-28
⋅
TrustedSec
⋅
Tailoring Cobalt Strike on Target Cobalt Strike |
2021-01-28
⋅
Google Project Zero
⋅
A Look at iMessage in iOS 14 |
2021-01-28
⋅
Palo Alto Networks Unit 42
⋅
Pro-Ocean: Rocke Group’s New Cryptojacking Malware Pro-Ocean |
2021-01-28
⋅
Microsoft
⋅
ZINC attacks against security researchers ComeBacker Klackring |
2021-01-28
⋅
Twitter (@struppigel)
⋅
Tweet on Sn0wsLogger malware Sn0wsLogger |
2021-01-28
⋅
ClearSky
⋅
“Lebanese Cedar” APT Global Lebanese Espionage Campaign Leveraging Web Servers Volatile Cedar |
2021-01-28
⋅
Hornetsecurity
⋅
Emotet Botnet Takedown Emotet |
2021-01-28
⋅
Hornetsecurity
⋅
BazarLoader’s Elaborate Flower Shop Lure BazarBackdoor |
2021-01-28
⋅
axios
⋅
In cyber espionage, U.S. is both hunted and hunter |
2021-01-28
⋅
InfoSec Handlers Diary Blog
⋅
Emotet vs. Windows Attack Surface Reduction Emotet |
2021-01-27
⋅
ThreatConnect
⋅
CrimsonIAS: Listening for an 3v1l User CrimsonIAS |