Click here to download all references as Bib-File.•
2020-11-18
⋅
CrowdStrike
⋅
Hacking Farm to Table: Threat Hunters Uncover Rise in Attacks Against Agriculture |
2020-11-18
⋅
Sophos
⋅
SOPHOS 2021 THREAT REPORT Navigating cybersecurity in an uncertain world Agent Tesla Dridex TrickBot Zloader |
2020-11-17
⋅
Google
⋅
TAG Bulletin: Q4 2020 |
2020-11-17
⋅
Symantec
⋅
Japan-Linked Organizations Targeted in Long-Running and Sophisticated Attack Campaign Quasar RAT |
2020-11-16
⋅
sonatype
⋅
Massive threat campaign strikes open-source repos, Sonatype spots new CursedGrabber malware |
2020-11-16
⋅
Malwarebytes
⋅
Malsmoke operators abandon exploit kits in favor of social engineering scheme Zloader Malsmoke |
2020-11-15
⋅
PRODAFT Threat Intelligence
⋅
BRUNHILDA - DaaS Malware Analysis Report Alien Brunhilda |
2020-11-12
⋅
Morphisec
⋅
Threat Profile: JUPYTER INFOSTEALER solarmarker |
2020-11-12
⋅
Anheng Threat Intelligence Center
⋅
Operation Gold Hunting: Targeting the Cutting-Edge Technology Industry |
2020-11-12
⋅
Dragos
⋅
Cyber Threat Perspective MANUFACTURING SECTOR Industroyer Snake |
2020-11-10
⋅
AP News
⋅
Threat Hunting for REvil Ransomware REvil |
2020-11-09
⋅
Area 1
⋅
Phishing Campaign Threatens Job Security, Drops Bazar and Buer Malware BazarBackdoor Buer |
2020-11-09
⋅
⋅
360
⋅
Analysis of the latest targeted attacks by Lugansk against Ukraine |
2020-11-09
⋅
Kaspersky Labs
⋅
Ghimob: a Tétrade threat actor moves to infect mobile devices Ghimob |
2020-11-06
⋅
Palo Alto Networks Unit 42
⋅
When Threat Actors Fly Under the Radar: Vatet, PyXie and Defray777 PyXie RansomEXX |
2020-11-06
⋅
Volexity
⋅
OceanLotus: Extending Cyber Espionage Operations Through Fake Websites Cobalt Strike KerrDown APT32 |
2020-11-04
⋅
Proofpoint
⋅
Persistent Actor Targets Ledger Cryptocurrency Wallets |
2020-10-30
⋅
US-CERT
⋅
Alert (AA20-304A): Iranian Advanced Persistent Threat Actor Identified Obtaining Voter Registration Data |
2020-10-30
⋅
⋅
360
⋅
蓝色魔眼(APT-C-41)组织首次针对我国重要机构定向攻击活动披露 StrongPity |
2020-10-30
⋅
⋅
Qianxin
⋅
攻击武器再升级:Donot组织利用伪造签名样本的攻击活动分析 |