Click here to download all references as Bib-File.•
2022-10-25
⋅
Newly Unsealed Indictment Charges Ukrainian National with International Cybercrime Operation Raccoon |
2022-10-10
⋅
RiskIQ
⋅
DEV-0832 Leverages Commodity Tools in Opportunistic Ransomware Campaigns BlackCat Mount Locker SystemBC Zeppelin |
2022-09-15
⋅
DuskRise
⋅
Erbium InfoStealer Enters the Scene: Characteristics and Origins Erbium Stealer |
2022-09-09
⋅
Elastic
⋅
BUGHATCH Malware Analysis BUGHATCH |
2022-08-25
⋅
Microsoft
⋅
MERCURY leveraging Log4j 2 vulnerabilities in unpatched systems to target Israeli organizations MimiKatz |
2022-08-24
⋅
Elastic
⋅
QBOT Malware Analysis QakBot |
2022-08-24
⋅
Microsoft
⋅
MagicWeb: NOBELIUM’s post-compromise trick to authenticate as anyone |
2022-08-18
⋅
DomainTools
⋅
A Sticky Situation Part 2 |
2022-08-15
⋅
Microsoft
⋅
Disrupting SEABORGIUM’s ongoing phishing operations Callisto |
2022-08-15
⋅
⋅
Weixin
⋅
Analysis of the characteristics of new activities organized by Patchwork APT in South Asia |
2022-08-15
⋅
Microsoft
⋅
Disrupting SEABORGIUM’s ongoing phishing operations |
2022-07-27
⋅
Microsoft
⋅
Untangling KNOTWEED: European private-sector offensive actor using 0-day exploits Subzero Denim Tsunami |
2022-07-27
⋅
Elastic
⋅
Exploring the QBOT Attack Pattern QakBot |
2022-07-27
⋅
Elastic
⋅
QBOT Configuration Extractor QakBot |
2022-07-25
⋅
Kaspersky
⋅
CosmicStrand: the discovery of a sophisticated UEFI firmware rootkit |
2022-07-14
⋅
Microsoft
⋅
North Korean threat actor (H0lyGh0st /DEV-0530) targets small and midsize businesses with H0lyGh0st ransomware SiennaBlue SiennaPurple Storm-0530 |
2022-07-12
⋅
Microsoft
⋅
From cookie theft to BEC: Attackers use AiTM phishing sites as entry point to further financial fraud |
2022-07-05
⋅
Microsoft
⋅
Hive ransomware gets upgrades in Rust Hive |
2022-06-29
⋅
Team Cymru
⋅
The Sliding Scale of Threat Actor Sophistication When Reacting to 0-day Vulnerabilities |
2022-06-02
⋅
Microsoft
⋅
Exposing POLONIUM activity and infrastructure targeting Israeli organizations POLONIUM |