Click here to download all references as Bib-File.•
2021-02-08
⋅
Dragos
⋅
Recommendations Following the Oldsmar Water Treatment Facility Cyber Attack |
2021-02-08
⋅
Lawfare Blog
⋅
What Is the Point of These Nation-State Indictments? Gameover P2P Nymaim |
2021-02-08
⋅
Wired
⋅
A Hacker Tried to Poison a Florida City's Water Supply, Officials Say |
2021-02-08
⋅
Morphisec
⋅
Long Live, Osiris; Banking Trojan Targets German IP Addresses Kronos |
2021-02-08
⋅
CrowdStrike
⋅
Blocking SolarMarker Backdoor solarmarker |
2021-02-08
⋅
Medium kurtikleiton
⋅
Evade EDR with Shellcode Injection and gain persistence using Registry Run Keys |
2021-02-08
⋅
⋅
heise online
⋅
Auf Tätersuche: Herausforderungen bei der Analyse von Cyber-Angriffen |
2021-02-08
⋅
ESET Research
⋅
THREAT REPORT Q4 2020 TrickBot |
2021-02-08
⋅
Checkpoint
⋅
After Lightning Comes Thunder Infy Tonnerre |
2021-02-08
⋅
GRNET CERT
⋅
Reverse engineering Emotet – Our approach to protect GRNET against the trojan Emotet |
2021-02-08
⋅
US-CERT
⋅
Malware Analysis Report (AR21-039B): MAR-10320115-1.v1 - TEARDROP TEARDROP |
2021-02-08
⋅
US-CERT
⋅
Malware Analysis Report (AR21-039A): SUNBURST SUNBURST |
2021-02-08
⋅
Medium Sebdraven
⋅
Babuk is distributed packed Babuk |
2021-02-08
⋅
Checkpoint
⋅
Domestic Kitten – An Inside Look at the Iranian Surveillance Operations FurBall Domestic Kitten |
2021-02-07
⋅
Technical Blog of Ali Aqeel
⋅
Dridex Malware Analysis Dridex |
2021-02-07
⋅
Bleeping Computer
⋅
New phishing attack uses Morse code to hide malicious URLs |
2021-02-06
⋅
⋅
Clairvoyance Security Lab
⋅
Mo Luoxiu (Confucius) organizes a new round of secret theft attacks on South Asian military enterprises Ave Maria |
2021-02-06
⋅
Medium mariohenkel
⋅
Decrypting AzoRult traffic for fun and profit Azorult |
2021-02-05
⋅
Silent Push
⋅
Behavior Clustering just got easier using new characteristics. |
2021-02-05
⋅
Morphisec
⋅
CinaRAT Resurfaces with New Evasive Tactics and Techniques Quasar RAT |