Click here to download all references as Bib-File.•
2020-05-20
⋅
Avast Decoded
⋅
GhostDNS Source Code Leaked |
2020-05-20
⋅
Reflectiz
⋅
The Gocgle Malicious Campaign magecart |
2020-05-20
⋅
Proofpoint
⋅
ZLoader Loads Again: New ZLoader Variant Returns Zloader |
2020-05-19
⋅
zero2auto
⋅
Netwalker Ransomware - From Static Reverse Engineering to Automatic Extraction Mailto |
2020-05-19
⋅
Hornetsecurity
⋅
Information Stealer Campaign Targeting German HR Contacts LALALA Stealer |
2020-05-19
⋅
Advanced Intelligence
⋅
NetWalker Ransomware Group Enters Advanced Targeting “Game” Mailto |
2020-05-19
⋅
Symantec
⋅
Sophisticated Espionage Group Turns Attention to Telecom Providers in South Asia ISMAgent ISMDoor |
2020-05-19
⋅
Cisco Talos
⋅
The wolf is back... WolfRAT |
2020-05-19
⋅
AlienLabs
⋅
TrickBot BazarLoader In-Depth Anchor BazarBackdoor TrickBot |
2020-05-18
⋅
Threatpost
⋅
Ransomware Gang Arrested for Spreading Locky to Hospitals Locky |
2020-05-18
⋅
Trend Micro
⋅
Netwalker Fileless Ransomware Injected via Reflective Loading Mailto |
2020-05-18
⋅
Palo Alto Networks Unit 42
⋅
Eleethub: A Cryptocurrency Mining Botnet with Rootkit for Self-Hiding PerlBot |
2020-05-18
⋅
Github (dlegezo)
⋅
Microcin Decryptor Microcin |
2020-05-18
⋅
ZDNet
⋅
FBI: ProLock ransomware gains access to victim networks via Qakbot infections PwndLocker |
2020-05-18
⋅
One Night in Norfolk
⋅
Looking Back at LiteDuke LiteDuke |
2020-05-17
⋅
CrowdStrike
⋅
CrowdStrike Falcon Detects Kernel Attacks Exploiting Vulnerable Dell Driver (CVE-2021-21551) |
2020-05-16
⋅
atdotde
⋅
High Performance Hackers Loerbas |
2020-05-16
⋅
Cado Security
⋅
Recent Attacks Against Supercomputers Loerbas |
2020-05-15
⋅
SentinelOne
⋅
A Guide to macOS Threat Hunting and Incident Response |
2020-05-15
⋅
MalwareLab.pl
⋅
In depth analysis of Lazarus validator |