Click here to download all references as Bib-File.•
2022-03-23
⋅
Morphisec
⋅
New JSSLoader Trojan Delivered Through XLL Files JSSLoader |
2022-03-22
⋅
Avast Decoded
⋅
Operation Dragon Castling: APT group targeting betting companies FormerFirstRAT MulCom TianWu |
2022-03-06
⋅
Qualys
⋅
AvosLocker Ransomware Behavior Examined on Windows & Linux Avoslocker AvosLocker |
2022-03-05
⋅
University of Zaragoza
⋅
Effectiveness of Similarity Digest Algorithms for Binary Code Similarity in Memory Forensic Analysis |
2022-02-16
⋅
Medium s2wlab
⋅
Post Mortem of KlaySwap Incident through BGP Hijacking | EN |
2022-02-14
⋅
Morphisec
⋅
Journey of a Crypto Scammer - NFT-001 AsyncRAT BitRAT Remcos |
2022-02-14
⋅
Morphisec
⋅
Journey of a Crypto Scammer - NFT-001 AsyncRAT BitRAT Remcos |
2022-02-09
⋅
Flashpoint
⋅
Russia Seizes Ferum, Sky-Fraud, UAS, and Trump’s Dumps—and Signals More Takedowns to Come |
2022-02-02
⋅
Qualys
⋅
Catching the RAT called Agent Tesla Agent Tesla |
2022-02-01
⋅
Xenomorph: A newly hatched Banking Trojan Xenomorph |
2022-01-31
⋅
IBM
⋅
Top-Ranking Banking Trojan Ramnit Out to Steal Payment Card Data Ramnit |
2022-01-28
⋅
Morphisec
⋅
Log4j Exploit Hits Again: Vulnerable Unifi Network Application (Ubiquiti) at Risk Cobalt Strike |
2022-01-27
⋅
CrowdStrike
⋅
Programs Hacking Programs: How to Extract Memory Information to Spot Linux Malware |
2022-01-25
⋅
Morphisec
⋅
New Threat Campaign Identified: AsyncRAT Introduces a New Delivery Technique AsyncRAT |
2022-01-25
⋅
Avast
⋅
Chasing Chaes Kill Chain Chaes |
2022-01-24
⋅
IBM
⋅
TrickBot Bolsters Layered Defenses to Prevent Injection Research TrickBot |
2022-01-20
⋅
Morphisec
⋅
Log4j Exploit Hits Again: Vulnerable VMWare Horizon Servers at Risk Cobalt Strike |
2022-01-19
⋅
Recorded Future
⋅
The People's Liberation Army in the South China Sea: An Organizational Guide |
2022-01-05
⋅
ARMOR
⋅
Threat Intelligence Report: The Evolution of Doppel Spider from BitPaymer to Grief Ransomware DoppelPaymer FriedEx |
2022-01-01
⋅
Symposium on Electronic Crime Research
⋅
Money Over Morals: A Business Analysis of Conti Ransomware Conti Conti |