Click here to download all references as Bib-File.•
2022-09-08
⋅
Trend Micro
⋅
How Malicious Actors Abuse Native Linux Tools in Attacks |
2022-09-06
⋅
Trend Micro
⋅
Play Ransomware's Attack Playbook Similar to that of Hive, Nokoyawa PLAY |
2022-09-02
⋅
Trend Micro
⋅
Buzzing in the Background: BumbleBee, a New Modular Backdoor Evolved From BookWorm |
2022-09-01
⋅
Trend Micro
⋅
Ransomware Spotlight Black Basta Black Basta Cobalt Strike MimiKatz QakBot |
2022-08-25
⋅
Trend Micro
⋅
New Golang Ransomware Agenda Customizes Attacks (IoCs) AgendaCrypt |
2022-08-25
⋅
Trend Micro
⋅
New Golang Ransomware Agenda Customizes Attacks AgendaCrypt |
2022-08-24
⋅
Trend Micro
⋅
Ransomware Actor Abuses Genshin Impact Anti-Cheat Driver to Kill Antivirus Babuk |
2022-08-24
⋅
Trend Micro
⋅
Ransomware Actor Abuses Genshin Impact Anti-Cheat Driver to Kill Antivirus (IoCs) Babuk |
2022-08-24
⋅
Trend Micro
⋅
Looking into the Void - Targeting Bulletproof Hosts to Block Attacks Early in the Kill Chain |
2022-08-12
⋅
Trend Micro
⋅
Iron Tiger Compromises Chat Application Mimi, Targets Windows, Mac, and Linux Users Rshell HyperBro Earth Berberoka |
2022-08-12
⋅
Trend Micro
⋅
Iron Tiger Compromises Chat Application Mimi, Targets Windows, Mac, and Linux Users (IOCs) HyperBro |
2022-08-11
⋅
Trend Micro
⋅
CopperStealer Distributes Malicious Chromium-based Browser Extension to Steal Cryptocurrencies CopperStealer |
2022-08-02
⋅
Trend Micro
⋅
SolidBit Ransomware Enters the RaaS Scene and Takes Aim at Gamers and Social Media Users With New Variant SolidBit |
2022-07-29
⋅
Trend Micro
⋅
Examining New DawDropper Banking Dropper and DaaS on the Dark Web Coper DawDropper |
2022-07-27
⋅
Trend Micro
⋅
Gootkit Loader’s Updated Tactics and Fileless Delivery of Cobalt Strike Cobalt Strike GootKit Kronos REvil SunCrypt |
2022-07-25
⋅
Trend Micro
⋅
LockBit Ransomware Group Augments Its Latest Variant, LockBit 3.0, With BlackMatter Capabilities BlackMatter LockBit |
2022-07-21
⋅
Trend Micro
⋅
Alibaba OSS Buckets Compromised to Distribute Malicious Shell Scripts via Steganography |
2022-07-20
⋅
Trend Micro
⋅
Analyzing Penetration-Testing Tools That Threat Actors Use to Breach Systems and Steal Data |
2022-07-06
⋅
Trend Micro
⋅
Brand-New HavanaCrypt Ransomware Poses as Google Software Update App, Uses Microsoft Hosting Service IP Address as C&C Server HavanaCrypt |
2022-07-05
⋅
Trend Micro
⋅
Ransomware Spotlight: BlackByte BlackByte |