Click here to download all references as Bib-File.•
2021-06-03
⋅
Secureworks
⋅
OAuth’s Device Code Flow Abused in Phishing Attacks |
2021-06-03
⋅
ESET Research
⋅
ESET Threat Report T 1 2021 Kobalos Janeleiro Vadokrist |
2021-06-03
⋅
Bleeping Computer
⋅
Chinese threat actors hacked NYC MTA using Pulse Secure zero-day |
2021-06-02
⋅
Trend Micro
⋅
Taking Advantage of PE Metadata, or How To Complete Your Favorite Threat Actor’s Sample Collection HyperSSL |
2021-06-02
⋅
Medium CyCraft
⋅
China-Linked Threat Group Targets Taiwan Critical Infrastructure, Smokescreen Ransomware Cobalt Strike ColdLock |
2021-06-01
⋅
Microsoft
⋅
New sophisticated email-based attack from NOBELIUM Cobalt Strike |
2021-06-01
⋅
⋅
Rising Threat Intelligence Center
⋅
Rising warning: APT organizes Lazarus Group to launch an attack on China |
2021-06-01
⋅
Bitdefender
⋅
Threat Actors Use Mockups of Popular Apps to Spread Teabot and Flubot Malware on Android Anatsa FluBot |
2021-05-28
⋅
Microsoft
⋅
Breaking down NOBELIUM’s latest early-stage toolset BOOMBOX Cobalt Strike |
2021-05-28
⋅
Twitter (@MBThreatIntel)
⋅
Tweet on web skimmer hiding JavaScript inside images for exfiltration |
2021-05-26
⋅
Facebook
⋅
Threat Report: The State of Influence Operations 2017-2020 |
2021-05-24
⋅
Anchored Narratives on Threat Intelligence and Geopolitics
⋅
Tracking StrongPity with Yara StrongPity |
2021-05-20
⋅
SubexSecure
⋅
CyberGate Threat Report CyberGate |
2021-05-20
⋅
Microsoft
⋅
Phorpiex morphs: How a longstanding botnet persists and thrives in the current threat environment Phorpiex |
2021-05-20
⋅
Github (microsoft)
⋅
Microsoft 365 Defender Hunting Queries for hunting multiple threat actors' TTPs and malwares STRRAT OceanLotus BabyShark Elise Revenge RAT WastedLocker Zebrocy |
2021-05-19
⋅
Medium Mehmet Ergene
⋅
Enterprise Scale Threat Hunting: Network Beacon Detection with Unsupervised ML and KQL — Part 2 Cobalt Strike |
2021-05-18
⋅
Blackberry
⋅
Strong ARMing with MacOS: Adventures in Cross-Platform Emulation |
2021-05-17
⋅
splunk
⋅
DarkSide Ransomware: Splunk Threat Update and Detections DarkSide |
2021-05-13
⋅
Secureworks
⋅
Ransomware Groups Use Tor-Based Backdoor for Persistent Access DarkSide Snatch GOLD WATERFALL |
2021-05-13
⋅
Blackberry
⋅
Threat Thursday: SombRAT — Always Leave Yourself a Backdoor SombRAT |