Click here to download all references as Bib-File.•
2023-09-18
⋅
KrebsOnSecurity
⋅
Who's Behind the 8Base Ransomware Website? 8Base |
2023-09-13
⋅
SecurityScorecard
⋅
A detailed analysis of the Money Message Ransomware Money Message |
2023-09-12
⋅
Security Intelligence
⋅
Email campaigns leverage updated DBatLoader to deliver RATs, stealers DBatLoader |
2023-09-08
⋅
K7 Security
⋅
RomCom RAT: Not Your Typical Love Story ROMCOM RAT RomCom |
2023-09-07
⋅
SecurityIntelligence
⋅
New Hive0117 phishing campaign imitates conscription summons to deliver DarkWatchman malware DarkWatchman |
2023-09-07
⋅
Google
⋅
Active North Korean campaign targeting security researchers |
2023-09-06
⋅
Microsoft
⋅
Results of Major Technical Investigations for Storm-0558 Key Acquisition |
2023-08-29
⋅
KrebsOnSecurity
⋅
U.S. Hacks QakBot, Quietly Removes Botnet Infections QakBot |
2023-08-28
⋅
Gamaredon Activity amid Ukraine's Counteroffensive Pteranodon |
2023-08-25
⋅
Github (telekom-security)
⋅
DarkGate configuration extractor DarkGate |
2023-08-08
⋅
Security Service of Ukraine
⋅
Cyber Operation of Russian Intelligence Services as a Component of Confrontation on the Battlefield |
2023-08-08
⋅
Security Service of Ukraine
⋅
SBU exposes russian intelligence attempts to penetrate Armed Forces' planning operations system |
2023-08-07
⋅
0x7D0 Blog
⋅
How the Nintendo Wii Security Was Defeated Fail0verflow |
2023-07-31
⋅
Cado Security
⋅
Cado Security Labs Encounter Novel Malware, Redis P2Pinfect P2Pinfect |
2023-07-29
⋅
Google
⋅
Threat Horizons August 2023 Threat Horizons Report SharkBot Cobalt Strike |
2023-07-27
⋅
Bankinfo Security
⋅
Are Akira Ransomware's Crypto-Locking Malware Days Numbered? Akira Ryuk |
2023-07-25
⋅
K7 Security
⋅
Akira’s Play with Linux Akira |
2023-07-25
⋅
KrebsOnSecurity
⋅
Who and What is Behind the Malware Proxy Service SocksEscort? AVrecon |
2023-07-18
⋅
GitHub
⋅
Security alert: social engineering campaign targets technology industry employees (Jade Sleet/Storm-0954) |
2023-07-18
⋅
Positive Technologies
⋅
Space Pirates: a look into the group's unconventional techniques, new attack vectors, and tools Voidoor |