Click here to download all references as Bib-File.•
2020-06-05
⋅
Votiro
⋅
Anatomy of a Well-Crafted UPS, FedEx, and DHL Phishing Email During COVID-19 Dridex |
2020-06-05
⋅
Trend Micro
⋅
New Tekya Ad Fraud Found on Google Play |
2020-06-05
⋅
⋅
NSFOCUS
⋅
供应链攻击事件——针对Github中Java项目的定向攻击 Octopus Scanner |
2020-06-05
⋅
Github (DanusMinimus)
⋅
Zero2Auto - Netwalker Walk through Mailto |
2020-06-05
⋅
Hornetsecurity
⋅
Avaddon: From seeking affiliates to in-the-wild in 2 days Avaddon |
2020-06-04
⋅
⋅
脚本系贼寇之风兴起,买卖体系堪比勒索软件 EVILNUM More_eggs |
2020-06-04
⋅
Bitdefender
⋅
Loading DLLs for illicit profit. A story about a Metamorfo distribution campaign Metamorfo |
2020-06-04
⋅
Raytheon Blackbird Technologies
⋅
Threat Spotlight: Tycoon Ransomware Targets Education and Software Sectors |
2020-06-04
⋅
PTSecurity
⋅
COVID-19 and New Year greetings: an investigation into the tools and methods used by the Higaisa group Ghost RAT SongXY |
2020-06-04
⋅
Sophos Naked Security
⋅
Nuclear missile contractor hacked in Maze ransomware attack Maze |
2020-06-03
⋅
Palo Alto Networks Unit 42
⋅
Threat Assessment: Hangover Threat Group BackConfig VICEROY TIGER |
2020-06-03
⋅
⋅
Norwegian Defence Research Establishment (FFI)
⋅
Handling of ICT security incidents in Health South-East and the county governor's offices - an assessment (APT31 page-37) |
2020-06-03
⋅
Twitter (@LukasStefanko)
⋅
Tweet on ATANK Android ransomware ATANK |
2020-06-03
⋅
ByteRaptors Blog
⋅
The WizardOpium LPE: Exploiting CVE-2019-1458 |
2020-06-03
⋅
paloalto Networks Unit 42
⋅
Threat Assessment: Hangover Threat Group |
2020-06-03
⋅
Malwarebytes
⋅
New LNK attack tied to Higaisa APT discovered Higaisa |
2020-06-03
⋅
CERT-EU
⋅
Cyber brief (June2020) |
2020-06-03
⋅
Trend Micro
⋅
How to perform long term monitoring of careless threat actors BBSRAT HyperBro Trochilus RAT |
2020-06-03
⋅
VMWare Carbon Black
⋅
Medusa Locker Ransomware MedusaLocker |
2020-06-03
⋅
Kaspersky Labs
⋅
Cycldek: Bridging the (air) gap 8.t Dropper NewCore RAT PlugX USBCulprit GOBLIN PANDA Hellsing |