Click here to download all references as Bib-File.•
2021-09-23
⋅
Google
⋅
Financially motivated actor breaks certificate parsing to avoid detection OpenSUpdater |
2021-09-22
⋅
ThreatFabric
⋅
ERMAC - another Cerberus reborn AmpleBot Cerberus ERMAC |
2021-09-22
⋅
Cybereason
⋅
Threat Analysis Report: PrintNightmare and Magniber Ransomware Magniber |
2021-09-22
⋅
Secureworks
⋅
REvil Ransomware Reemerges After Shutdown; Universal Decryptor Released REvil REvil |
2021-09-22
⋅
GoSecure
⋅
GoSecure Titan Labs Technical Report: BluStealer Malware Threat BluStealer |
2021-09-21
⋅
Microsoft
⋅
Catching the big fish: Analyzing a large-scale phishing-as-a-service operation |
2021-09-20
⋅
IBM
⋅
2021 IBM SecurityX-Force Cloud Threat Landscape Report Kaiji Kinsing Tsunami Xanthe XOR DDoS |
2021-09-16
⋅
Twitter (@GossiTheDog)
⋅
Tweet on some unknown threat actor dropping Mgbot, custom IIS modular backdoor and cobalstrike using exploiting ProxyShell Cobalt Strike MgBot |
2021-09-16
⋅
Blackberry
⋅
Threat Thursday: NetWire RAT is Coming Down the Line NetWire RC |
2021-09-15
⋅
Microsoft
⋅
Analyzing attacks that exploit the CVE-2021-40444 MSHTML vulnerability EXOTIC LILY |
2021-09-15
⋅
Microsoft
⋅
Analyzing attacks that exploit the CVE-2021-40444 MSHTML vulnerability Cobalt Strike |
2021-09-10
⋅
Gigamon
⋅
Rendering Threats: A Network Perspective BumbleBee Cobalt Strike |
2021-09-10
⋅
ThreatFabric
⋅
S.O.V.A. - A new Android Banking trojan with fowl intentions S.O.V.A. |
2021-09-09
⋅
Blackberry
⋅
Threat Thursday: Get Your Paws Off My Data, Raccoon Infostealer Raccoon |
2021-09-09
⋅
Symantec
⋅
Grayfly: Chinese Threat Actor Uses Newly-discovered Sidewalk Malware CROSSWALK MimiKatz SideWalk |
2021-09-08
⋅
CrowdStrike
⋅
2021 Threat Hunting Report |
2021-09-08
⋅
SentinelOne
⋅
Egomaniac: An Unscrupulous Turkish-Nexus Threat Actor Ahtapot Rad Turkojan |
2021-09-07
⋅
CUJOAI
⋅
Threat Alert: Mirai/Gafgyt Fork with New DDoS Modules Discovered Bashlite Mirai |
2021-09-02
⋅
Mandiant
⋅
Advanced Persistent Threats (APTs) APT9 |
2021-09-01
⋅
YouTube (Black Hat)
⋅
Threat Hunting in Active Directory Environment |