Click here to download all references as Bib-File.•
2023-01-14
⋅
YouTube (CODE BLUE)
⋅
[CB22]Tracking the Entire Iceberg - Long-term APT Malware C2 Protocol Emulation and Scanning ShadowPad Winnti |
2023-01-13
⋅
AhnLab
⋅
Orcus RAT Being Distributed Disguised as a Hangul Word Processor Crack Orcus RAT |
2023-01-13
⋅
⋅
Cyber Police of Ukraine
⋅
The cyber police exposed a hacker group that attacked foreign companies with an encryption virus |
2023-01-12
⋅
Sentinel LABS
⋅
NoName057(16) – The Pro-Russian Hacktivist Group Targeting NATO Bobik Dosia NoName057(16) |
2023-01-12
⋅
eSentire
⋅
Gootloader Malware Leads to Cobalt Strike and Hand-on-Keyboard Activity GootLoader |
2023-01-11
⋅
Group-IB
⋅
Dark Pink: New APT group targets governmental, military organizations in APAC, Europe TelePowerBot |
2023-01-11
⋅
Group-IB
⋅
Dark Pink - New APT hitting Asia-Pacific, Europe that goes deeper and darker |
2023-01-10
⋅
The Record
⋅
Pro-Ukraine hackers leak Russian data in hopes someone will make sense of it Cyber Partisans |
2023-01-10
⋅
360 netlab
⋅
Heads up! Xdr33, A Variant Of CIA’s HIVE Attack Kit Emerges xdr33 |
2023-01-09
⋅
Trendmicro
⋅
Gootkit Loader Actively Targets Australian Healthcare Industry GootLoader GootKit |
2023-01-06
⋅
cyble
⋅
LummaC2 Stealer: A Potent Threat To Crypto Users Lumma Stealer |
2023-01-05
⋅
AttackIQ
⋅
Emulating the Highly Sophisticated North Korean Adversary Lazarus Group MagicRAT Tiger RAT |
2023-01-05
⋅
Bleeping Computer
⋅
Bitdefender releases free MegaCortex ransomware decryptor MegaCortex |
2023-01-05
⋅
Logpoint
⋅
A crowning achievement: Exploring the exploit of Royal ransomware Royal Ransom |
2023-01-04
⋅
CSO Online
⋅
Cyberattacks against governments jumped 95% in last half of 2022, CloudSek says BlueHornet |
2023-01-04
⋅
Unpacking RedLine Stealer RedLine Stealer |
2023-01-04
⋅
Bleeping Computer
⋅
Rackspace confirms Play ransomware was behind recent cyberattack PLAY |
2023-01-01
⋅
ThreatMon
⋅
APT41's Attack Chain: Exe-LolBins Leads to Powershell Backdoor with Telegram C2 |
2023-01-01
⋅
ThreatMon
⋅
Reverse Engineering RokRAT: A Closer Look at APT37’s Onedrive-Based Attack Vector RokRAT |
2023-01-01
⋅
ThreatMon
⋅
Threat Analysis: SharpPanda APT’s Attack Chain Targeting G20 Nations |