Click here to download all references as Bib-File.•
2020-11-12
⋅
Dragos
⋅
Cyber Threat Perspective MANUFACTURING SECTOR Industroyer Snake |
2020-11-10
⋅
AP News
⋅
Threat Hunting for REvil Ransomware REvil |
2020-11-09
⋅
Area 1
⋅
Phishing Campaign Threatens Job Security, Drops Bazar and Buer Malware BazarBackdoor Buer |
2020-11-09
⋅
⋅
360
⋅
Analysis of the latest targeted attacks by Lugansk against Ukraine |
2020-11-09
⋅
Kaspersky Labs
⋅
Ghimob: a Tétrade threat actor moves to infect mobile devices Ghimob |
2020-11-06
⋅
Palo Alto Networks Unit 42
⋅
When Threat Actors Fly Under the Radar: Vatet, PyXie and Defray777 PyXie RansomEXX |
2020-11-06
⋅
Volexity
⋅
OceanLotus: Extending Cyber Espionage Operations Through Fake Websites Cobalt Strike KerrDown APT32 |
2020-11-04
⋅
Proofpoint
⋅
Persistent Actor Targets Ledger Cryptocurrency Wallets |
2020-10-30
⋅
US-CERT
⋅
Alert (AA20-304A): Iranian Advanced Persistent Threat Actor Identified Obtaining Voter Registration Data |
2020-10-30
⋅
⋅
360
⋅
蓝色魔眼(APT-C-41)组织首次针对我国重要机构定向攻击活动披露 StrongPity |
2020-10-30
⋅
⋅
Qianxin
⋅
攻击武器再升级:Donot组织利用伪造签名样本的攻击活动分析 |
2020-10-29
⋅
Palo Alto Networks Unit 42
⋅
Threat Assessment: Ryuk Ransomware and Trickbot Targeting U.S. Healthcare and Public Health Sector Anchor BazarBackdoor Ryuk TrickBot |
2020-10-29
⋅
McAfee
⋅
McAfee Labs Threat Advisory Ransom-Ryuk Ryuk |
2020-10-28
⋅
KrebsOnSecurity
⋅
FBI, DHS, HHS Warn of Imminent, Credible Ransomware Threat Against U.S. Hospitals Ryuk |
2020-10-28
⋅
ESET Research
⋅
THREAT REPORT Q3 2020 |
2020-10-27
⋅
US-CERT
⋅
Alert (AA20-301A): North Korean Advanced Persistent Threat Focus: Kimsuky BabyShark GREASE MECHANICAL Meterpreter Kimsuky |
2020-10-27
⋅
Sophos Managed Threat Response (MTR)
⋅
MTR Casebook: An active adversary caught in the act Cobalt Strike |
2020-10-26
⋅
AWAKE
⋅
Threat Hunting for Avaddon Ransomware Avaddon |
2020-10-26
⋅
⋅
Qianxin
⋅
Analysis of the attack activities of the Rattlesnake organization using the Buffy bilateral agreement as bait SideWinder |
2020-10-23
⋅
F-Secure Labs
⋅
Catching Lazarus: Threat Intelligence to Real Detection Logic - Part Two MimiKatz |