Click here to download all references as Bib-File.•
| 2022-12-29
⋅
The Record
⋅
This app will self-destruct: How Belarusian hackers created an alternative Telegram for activists Cyber Partisans |
| 2022-12-29
⋅
Minerva Labs
⋅
New CatB Ransomware Employs 2-Year Old DLL Hijacking Technique To Evade Detection CatB |
| 2022-12-28
⋅
⋅
NSFOCUS
⋅
Analysis of Cyber Attacks by APT Organization Confucius Against IBO Anti-Terrorism Operations in Pakistan Confucius Confucious |
| 2022-12-24
⋅
di.sclosu.re
⋅
njRAT malware spreading through Discord CDN and Facebook Ads NjRAT |
| 2022-12-23
⋅
Quick Heal
⋅
Protect yourself from Vishing Attack!! |
| 2022-12-22
⋅
⋅
Cert-UA
⋅
Cyber attack on DELTA system users using RomCom/FateGrab/StealDeal malware (CERT-UA#5709) ROMCOM RAT |
| 2022-12-21
⋅
Trustwave
⋅
Malicious Macros Adapt to Use Microsoft Publisher to Push Ekipa RAT Ekipa RAT |
| 2022-12-21
⋅
Trendmicro
⋅
Conti Team One Splinter Group Resurfaces as Royal Ransomware with Callback Phishing Attacks Royal Ransom |
| 2022-12-21
⋅
Team Cymru
⋅
Inside the IcedID BackConnect Protocol IcedID |
| 2022-12-20
⋅
ThreatBook
⋅
Analysis of APT-C-60 Attack on South Korea SpyGrace |
| 2022-12-20
⋅
The Record
⋅
Russian hackers targeted petroleum refining company in NATO state |
| 2022-12-19
⋅
kienmanowar Blog
⋅
[Z2A]Bimonthly malware challege – Emotet (Back From the Dead) Emotet |
| 2022-12-18
⋅
ZAYOTEM
⋅
Raccoon Stealer Technical Analysis Report Raccoon |
| 2022-12-16
⋅
SOCRadar
⋅
Dark Web Profile: Killnet – Russian Hacktivist Group Zarya |
| 2022-12-16
⋅
Carnegie Endowment for International Peace
⋅
Russia’s Wartime Cyber Operations in Ukraine: Military Impacts, Influences, and Implications |
| 2022-12-15
⋅
Europol
⋅
Global crackdown against DDoS services shuts down most popular platforms |
| 2022-12-15
⋅
NOZOMI Network Labs
⋅
Tracking Malicious Glupteba Activity Through the Blockchain Glupteba |
| 2022-12-14
⋅
ESET Research
⋅
Unmasking MirrorFace: Operation LiberalFace targeting Japanese political entities LODEINFO MirrorFace |
| 2022-12-13
⋅
Kroll
⋅
Threat Actors use Google Ads to Deploy VIDAR Stealer Vidar |
| 2022-12-12
⋅
Palo Alto Networks Unit 42
⋅
Precious Gemstones: The New Generation of Kerberos Attacks |