Click here to download all references as Bib-File.•
2022-07-06
⋅
Trend Micro
⋅
Brand-New HavanaCrypt Ransomware Poses as Google Software Update App, Uses Microsoft Hosting Service IP Address as C&C Server HavanaCrypt |
2022-07-05
⋅
Microsoft
⋅
Hive ransomware gets upgrades in Rust Hive |
2022-06-30
⋅
Microsoft
⋅
Using process creation properties to catch evasion techniques |
2022-06-30
⋅
Microsoft
⋅
Toll fraud malware: How an Android application can drain your wallet Joker |
2022-06-27
⋅
Netskope
⋅
Emotet: Still Abusing Microsoft Office Macros Emotet |
2022-06-23
⋅
InQuest
⋅
Follina, the Latest in a Long Chain of Microsoft Office Exploits |
2022-06-21
⋅
BleepingComputer
⋅
Microsoft Exchange servers hacked by new ToddyCat APT gang ToddyCat |
2022-06-16
⋅
ESET Research
⋅
How Emotet is changing tactics in response to Microsoft’s tightening of Office macro security Emotet |
2022-06-13
⋅
Microsoft
⋅
The many lives of BlackCat ransomware BlackCat Velvet Tempest |
2022-06-13
⋅
Microsoft
⋅
The many lives of BlackCat ransomware BlackCat |
2022-06-11
⋅
Twitter (@MsftSecIntel)
⋅
Tweet on DEV-0401, DEV-0234 exploiting Confluence RCE CVE-2022-26134 Kinsing Mirai Cobalt Strike Lilac Typhoon |
2022-06-03
⋅
Trustwave
⋅
Trustwave's Action Response: Microsoft zero-day CVE-2022-30190 (aka Follina) |
2022-06-02
⋅
Microsoft
⋅
Exposing POLONIUM activity and infrastructure targeting Israeli organizations POLONIUM |
2022-06-02
⋅
Microsoft
⋅
Complaint filed by Microsoft Digital Crimes Unit against BOHRIUM, a Iranian threat actor |
2022-06-01
⋅
Fortinet
⋅
CVE-2022-30190: Microsoft Support Diagnostic Tool (MSDT) RCE Vulnerability “Follina” turian |
2022-05-24
⋅
Deep instinct
⋅
Blame the Messenger: 4 Types of Dropper Malware in Microsoft Office & How to Detect Them Dridex Emotet |
2022-05-22
⋅
Bleeping Computer
⋅
PDF smuggles Microsoft Word doc to drop Snake Keylogger malware 404 Keylogger |
2022-05-19
⋅
Microsoft
⋅
Rise in XorDdos: A deeper look at the stealthy DDoS malware targeting Linux devices XOR DDoS |
2022-05-17
⋅
Microsoft Security
⋅
In hot pursuit of ‘cryware’: Defending hot wallets from attacks Mars Stealer RedLine Stealer |
2022-05-09
⋅
Microsoft Security
⋅
Ransomware-as-a-service: Understanding the cybercrime gig economy and how to protect yourself Griffon BazarBackdoor BlackCat BlackMatter Blister Gozi LockBit Pandora Rook SystemBC TrickBot |