Click here to download all references as Bib-File.•
2021-05-18
⋅
Bitdefender
⋅
New WastedLoader Campaign Delivered Through RIG Exploit Kit WastedLoader WastedLocker |
2021-05-05
⋅
SophosLabs Uncut
⋅
Intervention halts a ProxyLogon-enabled attack Cobalt Strike |
2021-05-04
⋅
Lacework Labs
⋅
Cpuminer & Friends |
2021-04-22
⋅
lacework
⋅
Sysrv-Hello Expands Infrastructure Sysrv-hello |
2021-04-21
⋅
SophosLabs Uncut
⋅
Nearly half of malware now use TLS to conceal communications Agent Tesla Cobalt Strike Dridex SystemBC |
2021-04-15
⋅
European Council
⋅
Declaration by the High Representative on behalf of the European Union expressing solidarity with the United States on the impact of the SolarWinds cyber operation SUNBURST |
2021-04-08
⋅
Palo Alto Networks Unit 42
⋅
Attackers Conducting Cryptojacking Operation Against U.S. Education Organizations |
2021-03-18
⋅
lacework
⋅
The “Kek Security” Network Kaiten N3Cr0m0rPh |
2021-03-17
⋅
Palo Alto Networks Unit 42
⋅
Satori: Mirai Botnet Variant Targeting Vantage Velocity Field Unit RCE Vulnerability Satori |
2021-03-15
⋅
Palo Alto Networks Unit 42
⋅
New Mirai Variant Targeting New IoT Vulnerabilities, Including in Network Security Devices Mirai |
2021-02-20
⋅
Medium (Nasreddine Bencherchali)
⋅
Finding Forensic Goodness In Obscure Windows Event Logs |
2021-02-17
⋅
US-CERT
⋅
Malware Analysis Report (AR21-048G): AppleJeus: Ants2Whale AppleJeus AppleJeus |
2021-02-04
⋅
HAL
⋅
From TTP to IoC: Advanced Persistent Graphs forThreat Hunting |
2021-02-01
⋅
GoSecure
⋅
BazarLoader Mocks Researchers in December 2020 Malspam Campaign BazarBackdoor |
2021-02-01
⋅
⋅
EST Security
⋅
Thallium organization conducts elaborate cyber attack against Russian researchers working in the North Korean economyPerforming sophisticated cyber attacks against researchers |
2021-01-27
⋅
lacework
⋅
Groundhog Botnet Rapidly Infecting Cloud XOR DDoS |
2021-01-25
⋅
Trend Micro
⋅
Fake Office 365 Used for Phishing Attacks on C-Suite Targets |
2021-01-24
⋅
Medium nasbench
⋅
Common Tools & Techniques Used By Threat Actors and Malware — Part I |
2021-01-18
⋅
Arxiv
⋅
Identifying Authorship Style in Malicious Binaries: Techniques, Challenges & Datasets |
2021-01-03
⋅
⋅
EST Security
⋅
Thallium organization exploits private stock investment messenger to attack software supply chain |