Click here to download all references as Bib-File.•
2020-07-13
⋅
Confiant
⋅
Internet Explorer CVE-2019–1367 In the wild Exploitation - prelude |
2020-07-13
⋅
⋅
Cert-AgID
⋅
Campagna sLoad v.2.9.3 veicolata via PEC sLoad |
2020-07-13
⋅
Microsoft
⋅
Become a Microsoft Defender ATP Ninja |
2020-07-13
⋅
Cofense
⋅
Fell Deeds Awake |
2020-07-12
⋅
Malware and Stuff
⋅
Deobfuscating DanaBot’s API Hashing DanaBot |
2020-07-11
⋅
BleepingComputer
⋅
TrickBot malware mistakenly warns victims that they are infected TrickBot |
2020-07-11
⋅
Trustwave
⋅
Injecting Magecart into Magento Global Config magecart |
2020-07-11
⋅
Advanced Intelligence
⋅
TrickBot Group Launches Test Module Alerting on Fraud Activity TrickBot |
2020-07-10
⋅
Vice
⋅
The Secret Service Tried to Catch a Hacker With a Malware Booby-Trap Dharma |
2020-07-10
⋅
FBI
⋅
Wanted poster: CHINA MSS GUANGDONG STATE SECURITY DEPARTMENT HACKERS BRONZE SPRING |
2020-07-10
⋅
Zscaler
⋅
Deep Dive Into the M00nD3V Logger M00nD3V Logger |
2020-07-10
⋅
360 netlab
⋅
The new Bigviktor Botnet is Targeting DrayTek Vigor Router BigViktor |
2020-07-10
⋅
Malwarebytes
⋅
Threat spotlight: WastedLocker, customized ransomware WastedLocker |
2020-07-10
⋅
Advanced Intelligence
⋅
The Dark Web of Intrigue: How REvil Used the Underground Ecosystem to Form an Extortion Cartel Gandcrab REvil |
2020-07-10
⋅
Github (eset)
⋅
Evilnum — Indicators of Compromise EVILNUM More_eggs EVILNUM TerraStealer |
2020-07-10
⋅
ByteAtlas
⋅
Knowledge Fragment: Casting Sandbox Necromancy on DADSTACHE DADSTACHE |
2020-07-10
⋅
ReversingLabs
⋅
YARA Rules talks and presentation of REVERSING 2020 |
2020-07-09
⋅
VMRay
⋅
Threat Bulletin: Dissecting GuLoader’s Evasion Techniques CloudEyE |
2020-07-09
⋅
Github (krautface)
⋅
Gist with observed grelos skimmer grelos |
2020-07-09
⋅
Gdata
⋅
ServHelper: Hidden Miners ServHelper |