Click here to download all references as Bib-File.•
| 2021-04-13
⋅
Silent Push
⋅
Malicious infrastructure as a service IcedID PhotoLoader QakBot |
| 2021-04-13
⋅
⋅
MBSD
⋅
Unraveling the internal structure of the Conti Ransomware Conti |
| 2021-04-13
⋅
Bitdefender
⋅
From Cracks to Empty Wallets – How Popular Cracks Lead to Digital Currency and Data Theft |
| 2021-04-13
⋅
lacework
⋅
Carbine Loader Cryptojacking Campaign |
| 2021-04-13
⋅
eSentire
⋅
Hackers Flood the Web with 100,000 Malicious Pages, Promising Professionals Free Business Forms, But Delivering Malware, Reports eSentire solarmarker |
| 2021-04-13
⋅
Twitter (@ESETresearch)
⋅
Tweet on TSCookie for FreeBSD platform TSCookie |
| 2021-04-13
⋅
The Record
⋅
Sweden drops Russian hacking investigation due to legal complications |
| 2021-04-13
⋅
CAPCOM
⋅
4th Update Regarding Data Security Incident Due to Unauthorized Access:Investigation Results RagnarLocker |
| 2021-04-13
⋅
FBI
⋅
Alert Number I-041321-PSA: Rise In Use of Cryptocurrency In Business Email Compromise Schemes |
| 2021-04-13
⋅
splunk
⋅
Detecting Clop Ransomware Clop |
| 2021-04-13
⋅
Department of Justice
⋅
Justice Department announces court-authorized effort to disrupt exploitation of Microsoft Exchange Server vulnerabilities |
| 2021-04-13
⋅
SophosLabs Uncut
⋅
Compromised Exchange server hosting cryptojacker targeting other Exchange servers |
| 2021-04-13
⋅
AlienLabs
⋅
Moobot updates its infrastructure and targets vulnerable Tenda routers MooBot |
| 2021-04-13
⋅
Kaspersky
⋅
Zero-day vulnerability in Desktop Window Manager (CVE-2021-28310) used in the wild |
| 2021-04-13
⋅
Palo Alto Networks Unit 42
⋅
Threat Assessment: Clop Ransomware Clop |
| 2021-04-13
⋅
CERT Polska / NASK
⋅
Keeping an eye on CloudEyE (GuLoader) - Reverse engineering the loader CloudEyE |
| 2021-04-12
⋅
Inde
⋅
A Different Kind of Zoombomb Cobalt Strike |
| 2021-04-12
⋅
Unpacking RAGNARLOCKER via emulation RagnarLocker |
| 2021-04-12
⋅
Github (NightfallGT)
⋅
Nitro Ransomware - Proof of Concept Nitro |
| 2021-04-12
⋅
Group-IB
⋅
Deep water: exploring phishing kits |