Click here to download all references as Bib-File.•
2020-06-18
⋅
Microsoft
⋅
Inside Microsoft Threat Protection: Mapping attack chains from cloud to endpoint (APT33/HOLMIUM) POWERTON |
2020-06-17
⋅
Youtube (Red Canary)
⋅
Threat Detection: Blue Mockingbird |
2020-06-16
⋅
Microsoft
⋅
Exploiting a crisis: How cybercriminals behaved during the outbreak |
2020-06-16
⋅
IBM
⋅
Cloud ThreatLandscape Report 2020 QNAPCrypt RokRAT |
2020-06-16
⋅
PTSecurity
⋅
Cobalt: tactics and tools update CobInt |
2020-06-16
⋅
Intezer
⋅
ELF Malware Analysis 101: Linux Threats No Longer an Afterthought Cloud Snooper Dacls EvilGnome HiddenWasp MESSAGETAP NOTROBIN QNAPCrypt Winnti |
2020-06-15
⋅
VMWare Carbon Black
⋅
TAU Threat Analysis: Relations to Hakbit Ransomware Hakbit |
2020-06-15
⋅
Sansec
⋅
Magecart strikes amid Corona lockdown magecart |
2020-06-12
⋅
ThreatConnect
⋅
Probable Sandworm Infrastructure Avaddon Emotet Kimsuky |
2020-06-11
⋅
SCYTHE
⋅
#ThreatThursday - Buhtrap Buhtrap |
2020-06-09
⋅
Kaspersky Labs
⋅
Looking at Big Threats Using Code Similarity. Part 1 Penquin Turla CCleaner Backdoor EternalPetya Regin WannaCryptor XTunnel |
2020-06-09
⋅
McAfee
⋅
RagnarLocker Ransomware Threatens to Release Confidential Information RagnarLocker |
2020-06-09
⋅
Microsoft
⋅
Web shell threat hunting with Azure Sentinel and Microsoft Threat Protection |
2020-06-09
⋅
Malwarebytes
⋅
Honda and Enel impacted by cyber attack suspected to be ransomware Snake |
2020-06-08
⋅
KELA
⋅
Schrodinger’s Threat – MagBo Adapts Access Control Policies |
2020-06-08
⋅
SentinelOne
⋅
A Guide to macOS Threat Hunting and Incident Response |
2020-06-08
⋅
VMWare Carbon Black
⋅
TAU Threat Analysis: Hakbit Ransomware Hakbit |
2020-06-08
⋅
Proofpoint
⋅
TA410: The Group Behind LookBack Attacks Against U.S. Utilities Sector Returns with New Malware FlowCloud Lookback APT10 TA410 |
2020-06-05
⋅
Google
⋅
Exploits of a TAG analyst chasing in the wild (slides) |
2020-06-05
⋅
⋅
Google
⋅
Exploits of a TAG analyst chasing in the wild (video) |