Click here to download all references as Bib-File.•
2020-08-07
⋅
QuoScient
⋅
BlackWater Malware Leveraging Beirut Tragedy in New Targeted Campaign |
2020-08-07
⋅
⋅
CSIRT Italia
⋅
New Phishing-As-A-Service framework |
2020-08-06
⋅
Theta
⋅
Part 3: analysing MedusaLocker ransomware MedusaLocker |
2020-08-06
⋅
KELA
⋅
The Secret Life of an Initial Access Broker |
2020-08-06
⋅
Wired
⋅
Chinese Hackers Have Pillaged Taiwan's Semiconductor Industry Cobalt Strike MimiKatz Winnti Red Charon |
2020-08-06
⋅
Twitter (@IntezerLabs)
⋅
Tweet on GOSH GOSH |
2020-08-06
⋅
Trend Micro
⋅
Water Nue Phishing Campaign Targets C-Suite’s Office 365 Accounts |
2020-08-06
⋅
FireEye
⋅
Bypassing MassLogger Anti-Analysis — a Man-in-the-Middle Approach MASS Logger |
2020-08-05
⋅
Theta
⋅
Part 2: Analysing MedusaLocker ransomware MedusaLocker |
2020-08-05
⋅
Blueliv
⋅
Playing with GuLoader Anti-VM techniques CloudEyE |
2020-08-05
⋅
Github (mauronz)
⋅
Emotet API+string deobfuscator (v0.1) Emotet |
2020-08-05
⋅
BlackHat
⋅
Demystifying Modern Windows Rootkits |
2020-08-05
⋅
BlackHat
⋅
FASTCashand INJX_PURE: How Threat Actors Use Public Standards for Financial Fraud FastCash |
2020-08-05
⋅
BlackHat
⋅
FASTCash and Associated Intrusion Techniques FastCash |
2020-08-04
⋅
Theta
⋅
Part 1: analysing MedusaLocker ransomware MedusaLocker |
2020-08-04
⋅
SophosLabs Uncut
⋅
WastedLocker’s techniques point to a familiar heritage WastedLocker |
2020-08-04
⋅
BlackHat
⋅
Operation Chimera - APT Operation Targets Semiconductor Vendors Cobalt Strike MimiKatz Winnti Red Charon |
2020-08-04
⋅
ZDNet
⋅
Ransomware gang publishes tens of GBs of internal data from LG and Xerox Maze |
2020-08-04
⋅
okta
⋅
CrimeOps: The Operational Art of Cyber Crime |
2020-08-03
⋅
IBM
⋅
InfectedNight - Mirai Variant With Massive Attacks On Our Honeypots Mirai |