Click here to download all references as Bib-File.•
2022-09-01
⋅
Trend Micro
⋅
Ransomware Spotlight Black Basta Black Basta Cobalt Strike MimiKatz QakBot |
2022-09-01
⋅
safebreach
⋅
SafeBreach Labs Researchers Uncover New Remote Access Trojan (RAT) |
2022-09-01
⋅
Zscaler
⋅
No Honor Among Thieves - Prynt Stealer’s Backdoor Exposed DarkEye Prynt Stealer WorldWind |
2022-09-01
⋅
Sentinel LABS
⋅
PyPI Phishing Campaign | JuiceLedger Threat Actor Pivots From Fake Apps to Supply Chain Attacks JuiceLedger |
2022-08-31
⋅
Intel 471
⋅
ERMAC 2.0: Perfecting the Account Takeover ERMAC |
2022-08-31
⋅
BitSight
⋅
Tracking PrivateLoader: Malware Distribution Service PrivateLoader RedLine Stealer SmokeLoader |
2022-08-30
⋅
eSentire
⋅
Hacker Infrastructure Used in Cisco Breach Discovered Attacking a Top Workforce Management Corporation & an Affiliate of Russia’s Evil Corp Gang Suspected, Reports eSentire Cobalt Strike FiveHands UNC2447 |
2022-08-30
⋅
SecurityScorecard
⋅
Brute Force Attempts May Have Preceded Ransomware Attack on School District |
2022-08-30
⋅
CYBER GEEKS All Things Infosec
⋅
ChromeLoader Browser Hijacker Choziosi |
2022-08-30
⋅
ANY.RUN
⋅
Raccoon Stealer 2.0 Malware analysis Raccoon RecordBreaker |
2022-08-29
⋅
Securonix
⋅
Securonix Threat Labs Security Advisory: New Golang Attack Campaign GO#WEBBFUSCATOR Leverages Office Macros and James Webb Images to Infect Systems |
2022-08-29
⋅
⋅
360 netlab
⋅
PureCrypter Loader continues to be active and has spread to more than 10 other families 404 Keylogger Agent Tesla AsyncRAT Formbook RedLine Stealer |
2022-08-28
⋅
BleepingComputer
⋅
LockBit ransomware gang gets aggressive with triple-extortion tactic LockBit |
2022-08-26
⋅
Malware development: persistence - part 9. Default file extension hijacking. Simple C++ example. Kimsuky |
2022-08-25
⋅
DataBreaches.net
⋅
Major Indonesia tollroad operator hacked by DESORDEN (Updated) Desorden Group |
2022-08-25
⋅
Palo Alto Networks Unit 42
⋅
Threat Assessment: Black Basta Ransomware Black Basta QakBot |
2022-08-25
⋅
Bitdefender
⋅
Hiding in the Shadows: Investigation of a Corporate Espionage Attack |
2022-08-25
⋅
⋅
SK Shieldus
⋅
Ghost Ransomware Response and Attack Analysis Report Gwisin |
2022-08-25
⋅
Darktrace
⋅
Detecting the Unknown: Revealing Uncategorized Ransomware Using Darktrace BlackByte |
2022-08-25
⋅
Trend Micro
⋅
New Golang Ransomware Agenda Customizes Attacks (IoCs) AgendaCrypt |