Click here to download all references as Bib-File.•
2022-03-22
⋅
Microsoft
⋅
DEV-0537 (UNC3661) criminal actor targeting organizations for data exfiltration and destruction RedLine Stealer LAPSUS |
2022-03-16
⋅
Microsoft
⋅
Uncovering Trickbot’s use of IoT devices in command-and-control infrastructure TrickBot |
2022-03-09
⋅
Department of Justice
⋅
Sodinokibi/REvil Ransomware Defendant Extradited to United States and Arraigned in Texas REvil |
2022-03-08
⋅
Recorded Future
⋅
The Media Environment and Domestic Public Opinion in China Toward Russia’s War On Ukraine |
2022-03-07
⋅
Elastic
⋅
PHOREAL Malware Targets the Southeast Asian Financial Sector PHOREAL |
2022-03-01
⋅
Elastic
⋅
Elastic protects against data wiper malware targeting Ukraine: HERMETICWIPER HermeticWiper |
2022-02-14
⋅
SecurityWeek
⋅
Sophisticated FritzFrog P2P Botnet Returns After Long Break FritzFrog |
2022-02-07
⋅
Elastic
⋅
Exploring Windows UAC Bypasses: Techniques and Detection Strategies |
2022-02-04
⋅
Microsoft
⋅
ACTINIUM targets Ukrainian organizations Pteranodon Gamaredon Group |
2022-02-04
⋅
Microsoft
⋅
ACTINIUM targets Ukrainian organizations DilongTrash DinoTrain Pteranodon QuietSieve Gamaredon Group |
2022-02-02
⋅
Elastic
⋅
Sandboxing Antimalware Products for Fun and Profit |
2022-01-19
⋅
Elastic
⋅
Operation Bleeding Bear WhisperGate |
2022-01-19
⋅
Elastic
⋅
Extracting Cobalt Strike Beacon Configurations Cobalt Strike |
2022-01-19
⋅
Elastic
⋅
Collecting Cobalt Strike Beacons with the Elastic Stack Cobalt Strike |
2022-01-19
⋅
Elastic
⋅
Operation Bleeding Bear WhisperGate |
2022-01-18
⋅
Elastic
⋅
FORMBOOK Adopts CAB-less Approach Formbook |
2022-01-13
⋅
F5
⋅
FluBot’s Authors Employ Creative and Sophisticated Techniques to Achieve Their Goals in Version 5.0 and Beyond FluBot |
2021-12-23
⋅
Elastic
⋅
Elastic Security uncovers BLISTER malware campaign Blister |
2021-12-16
⋅
Symantec
⋅
Noberus: Technical Analysis Shows Sophistication of New Rust-based Ransomware BlackCat |
2021-12-11
⋅
Microsoft
⋅
Guidance for preventing, detecting, and hunting for exploitation of the Log4j 2 vulnerability Khonsari NightSky BRONZE STARLIGHT |