Click here to download all references as Bib-File.•
2020-06-10
⋅
Microsoft
⋅
Misconfigured Kubeflow workloads are a security risk |
2020-06-10
⋅
Recorded Future
⋅
New Ransomware-as-a-Service Tool ‘Thanos’ Shows Connections to ‘Hakbit Hakbit |
2020-06-10
⋅
Gdata
⋅
Harmful Logging - Diving into MassLogger MASS Logger |
2020-06-09
⋅
Sophos Labs
⋅
Kingminer escalates attack complexity for cryptomining Kingminer |
2020-06-09
⋅
Github (citizenlab)
⋅
Dark Basin Indicators of Compromise Dark Basin |
2020-06-09
⋅
Github (Sentinel-One)
⋅
CobaltStrikeParser Cobalt Strike |
2020-06-09
⋅
Kaspersky Labs
⋅
Looking at Big Threats Using Code Similarity. Part 1 Penquin Turla CCleaner Backdoor EternalPetya Regin WannaCryptor XTunnel |
2020-06-09
⋅
CitizenLab
⋅
Dark Basin Uncovering a Massive Hack-For-Hire Operation Dark Basin |
2020-06-09
⋅
RAND Corporation
⋅
The Past, Present, and Future of Russia’s Cyber Strategy and Forces |
2020-06-09
⋅
McAfee
⋅
RagnarLocker Ransomware Threatens to Release Confidential Information RagnarLocker |
2020-06-09
⋅
RiskIQ
⋅
Misconfigured Amazon S3 Buckets Continue to be a Launchpad for Malicious Code magecart |
2020-06-09
⋅
Lab52
⋅
Recent FK_Undead rootkit samples found in the wild |
2020-06-09
⋅
Sentinel LABS
⋅
Valak Malware and the Connection to Gozi Loader ConfCrew Valak |
2020-06-09
⋅
Microsoft
⋅
Web shell threat hunting with Azure Sentinel and Microsoft Threat Protection |
2020-06-09
⋅
Malwarebytes
⋅
Honda and Enel impacted by cyber attack suspected to be ransomware Snake |
2020-06-08
⋅
Akamai
⋅
The Bondnet Army Bondnet |
2020-06-08
⋅
KELA
⋅
Schrodinger’s Threat – MagBo Adapts Access Control Policies |
2020-06-08
⋅
Medium shantanukhande
⋅
Red Team: Using SharpChisel to exfil internal network |
2020-06-08
⋅
ESET Research
⋅
InvisiMole: The Hidden Part of the Story - Unearthing InvisiMole's Espionage Toolset and Strategic Cooperations InvisiMole RC2FM |
2020-06-08
⋅
QNAP
⋅
eCh0raix Ransomware QNAPCrypt |