Click here to download all references as Bib-File.•
2020-11-05
⋅
McAfee
⋅
Operation North Star: Behind The Scenes NedDnLoader Torisma |
2020-11-01
⋅
AppRiver
⋅
Vjw0rm Is Back With New Tactics Vjw0rm |
2020-10-30
⋅
Reuters
⋅
Russian hackers targeted California, Indiana Democratic parties |
2020-10-29
⋅
Reuters
⋅
Building wave of ransomware attacks strike U.S. hospitals Ryuk |
2020-10-23
⋅
Reuters
⋅
Exclusive: National Guard called in to thwart cyberattack in Louisiana weeks before election KimJongRat |
2020-10-23
⋅
Reuters
⋅
Exclusive: 'Dumb mistake' exposed Iranian hand behind fake Proud Boys U.S. election emails - sources |
2020-10-15
⋅
lacework
⋅
Moobot's Cloud Migration |
2020-10-07
⋅
Github (brompwnie)
⋅
Break out the Box (BOtB) Break out the Box |
2020-09-29
⋅
Cisco Talos
⋅
LodaRAT Update: Alive and Well Loda |
2020-08-31
⋅
Inde
⋅
Analysis of the latest wave of Emotet malicious documents Emotet |
2020-08-17
⋅
Cado Security
⋅
Team TNT – The First Crypto-Mining Worm to Steal AWS Credentials TeamTNT TeamTNT |
2020-08-17
⋅
Cado Security
⋅
Team TNT - The First Crypto-Mining Worm to Steal AWS Credentials TeamTNT |
2020-07-14
⋅
International Journal of Intelligence and Counter Intelligence
⋅
Cyber Threat Intelligence: A Product Without aProcess? |
2020-07-10
⋅
ReversingLabs
⋅
YARA Rules talks and presentation of REVERSING 2020 |
2020-07-01
⋅
Lookout
⋅
Multiyear Surveillance Campaigns Discovered Targeting Uyghurs |
2020-06-30
⋅
CrowdStrike
⋅
Playing Chess Against Nation-State and Ransomware Threat Actors |
2020-06-24
⋅
Palo Alto Networks Unit 42
⋅
Lucifer: New Cryptojacking and DDoS Hybrid Malware Exploiting High and Critical Vulnerabilities to Infect Windows Devices Lucifer |
2020-06-16
⋅
Graphika
⋅
Secondary Infektion |
2020-06-11
⋅
Cado Security
⋅
An Ongoing AWS Phishing Campaign |
2020-06-08
⋅
Christian Haschek's Blog
⋅
The A1 Telekom Austria Hack |