Click here to download all references as Bib-File.•
2021-03-02
⋅
Intezer
⋅
When Viruses Mutate: Did SunCrypt Ransomware Evolve from QNAPCrypt? QNAPCrypt SunCrypt |
2021-02-25
⋅
JPCERT/CC
⋅
Emotet Disruption and Outreach to Affected Users Emotet |
2021-02-16
⋅
SophosLabs Uncut
⋅
What to expect when you’ve been hit with Conti ransomware Conti |
2021-02-05
⋅
Silent Push
⋅
Behavior Clustering just got easier using new characteristics. |
2021-01-26
⋅
SophosLabs Uncut
⋅
Nefilim Ransomware Attack Uses “Ghost” Credentials Nefilim |
2021-01-17
⋅
Twitter (@AltShiftPrtScn)
⋅
Tweet on Conti Ransomware group exploiting FortiGate VPNs to drop in CobaltStrike loaders Cobalt Strike Conti |
2021-01-04
⋅
Cisco Talos
⋅
Interview with a LockBit ransomware operator LockBit |
2020-12-22
⋅
Prevasio
⋅
Sunburst Backdoor, Part III: DGA & Security Software (Broken Link) SUNBURST |
2020-12-21
⋅
Silent Push
⋅
Investigating Crimeware Name Servers |
2020-12-18
⋅
Silent Push
⋅
High Value Malicious Domains. |
2020-12-16
⋅
RiskIQ
⋅
Skimming a Little Off the Top: Meyhod’s Skimming Methods Hit Hairloss Specialists magecart |
2020-12-15
⋅
Prevasio
⋅
Sunburst Backdoor: A Deeper Look Into The SolarWinds' Supply Chain Malware (Broken link) SUNBURST |
2020-12-09
⋅
Intezer
⋅
A Zebra in Gopher's Clothing: Russian APT Uses COVID-19 Lures to Deliver Zebrocy Zebrocy |
2020-12-08
⋅
Sophos
⋅
Egregor ransomware: Maze’s heir apparent Egregor Maze |
2020-12-02
⋅
RiskIQ
⋅
Shadow Academy: Hiding in the shadows of Mabna Institute Silent Librarian |
2020-10-28
⋅
SophosLabs Uncut
⋅
Hacks for sale: inside the Buer Loader malware-as-a-service Buer Ryuk Zloader |
2020-10-28
⋅
FireEye
⋅
Unhappy Hour Special: KEGTAP and SINGLEMALT With a Ransomware Chaser BazarBackdoor Cobalt Strike Ryuk UNC1878 |
2020-10-14
⋅
Palo Alto Networks Unit 42
⋅
Two New IoT Vulnerabilities Identified with Mirai Payloads Mirai |
2020-10-06
⋅
Malwarebytes
⋅
Release the Kraken: Fileless APT attack abuses Windows Error Reporting service |
2020-09-29
⋅
Proofpoint
⋅
TA2552 Uses OAuth Access Token Phishing to Exploit Read-Only Risks TA2552 |