Click here to download all references as Bib-File.•
2022-08-15
⋅
SecurityScorecard
⋅
A Deep Dive Into Black Basta Ransomware Black Basta |
2022-08-15
⋅
SecurityScorecard
⋅
A Deep Dive Into Black Basta Ransomware Black Basta |
2022-08-09
⋅
Zscaler
⋅
AiTM phishing attack targeting enterprise users of Gmail |
2022-08-04
⋅
Fortinet
⋅
Ransomware Roundup: Redeemer, Beamed, and More |
2022-08-02
⋅
Zscaler
⋅
Large-Scale AiTM Attack targeting enterprise users of Microsoft email services |
2022-07-18
⋅
SecurityScorecard
⋅
A Deep Dive Into ALPHV/BlackCat Ransomware BlackCat |
2022-07-13
⋅
Microsoft
⋅
Uncovering a macOS App Sandbox escape vulnerability: A deep dive into CVE-2022-26706 |
2022-06-27
⋅
Zscaler
⋅
Return of the Evilnum APT with updated TTPs and new targets EVILNUM EVILNUM |
2022-06-24
⋅
Github (x-junior)
⋅
Deep Analysis of Snake Keylogger 404 Keylogger |
2022-06-24
⋅
Palo Alto Networks Unit 42
⋅
There Is More Than One Way to Sleep: Dive Deep Into the Implementations of API Hammering by Various Malware Families BazarBackdoor Zloader |
2022-06-17
⋅
Zscaler
⋅
Resurgence of Voicemail-themed phishing attacks targeting key industry verticals in the US |
2022-06-01
⋅
Deep instinct
⋅
Iranian Threat Actor Continues to Develop Mass Exploitation Tools CobaltMirage FRP |
2022-05-24
⋅
Deep instinct
⋅
Blame the Messenger: 4 Types of Dropper Malware in Microsoft Office & How to Detect Them Dridex Emotet |
2022-05-21
⋅
Github (x-junior)
⋅
Deep Analysis of Mars Stealer Mars Stealer |
2022-05-19
⋅
Zscaler
⋅
Vidar distributed through backdoored Windows 11 downloads and abusing Telegram Vidar |
2022-05-19
⋅
Microsoft
⋅
Rise in XorDdos: A deeper look at the stealthy DDoS malware targeting Linux devices XOR DDoS |
2022-05-18
⋅
Yoroi
⋅
A deep dive into Eternity Group: A new emerging Cyber Threat Eternity Ransomware Eternity Stealer Eternity Worm Lilith |
2022-05-09
⋅
Blackberry
⋅
Dirty Deeds Done Dirt Cheap: Russian RAT Offers Backdoor Bargains DCRat NjRAT |
2022-05-04
⋅
Cybereason
⋅
Operation CuckooBees: Deep-Dive into Stealthy Winnti Techniques PRIVATELOG Spyder STASHLOG Winnti |
2022-05-04
⋅
Cybereason
⋅
Operation CuckooBees: A Winnti Malware Arsenal Deep-Dive PRIVATELOG Spyder STASHLOG Winnti |