Click here to download all references as Bib-File.•
2023-08-08
⋅
Security Service of Ukraine
⋅
Cyber Operation of Russian Intelligence Services as a Component of Confrontation on the Battlefield |
2023-08-08
⋅
Security Service of Ukraine
⋅
SBU exposes russian intelligence attempts to penetrate Armed Forces' planning operations system |
2023-08-07
⋅
0x7D0 Blog
⋅
How the Nintendo Wii Security Was Defeated Fail0verflow |
2023-07-31
⋅
Cado Security
⋅
Cado Security Labs Encounter Novel Malware, Redis P2Pinfect P2Pinfect |
2023-07-29
⋅
Google
⋅
Threat Horizons August 2023 Threat Horizons Report SharkBot Cobalt Strike |
2023-07-27
⋅
Bankinfo Security
⋅
Are Akira Ransomware's Crypto-Locking Malware Days Numbered? Akira Ryuk |
2023-07-25
⋅
K7 Security
⋅
Akira’s Play with Linux Akira |
2023-07-25
⋅
KrebsOnSecurity
⋅
Who and What is Behind the Malware Proxy Service SocksEscort? AVrecon |
2023-07-18
⋅
GitHub
⋅
Security alert: social engineering campaign targets technology industry employees (Jade Sleet/Storm-0954) |
2023-07-18
⋅
Positive Technologies
⋅
Space Pirates: a look into the group's unconventional techniques, new attack vectors, and tools Voidoor |
2023-07-17
⋅
Acronis
⋅
8Base ransomware stays unseen for a year 8Base Phobos SmokeLoader |
2023-07-17
⋅
SecurityScorecard
⋅
A technical analysis of the Quasar-forked RAT called VoidRAT VoidRAT |
2023-07-06
⋅
WeLiveSecurity
⋅
What’s up with Emotet? Emotet |
2023-06-30
⋅
K7 Security
⋅
Cobalt Strike’s Deployment with Hardware Breakpoint for AMSI Bypass Cobalt Strike |
2023-06-27
⋅
SecurityIntelligence
⋅
The Trickbot/Conti Crypters: Where Are They Now? Black Basta Conti Mount Locker PhotoLoader Royal Ransom SystemBC TrickBot |
2023-06-23
⋅
Securonix
⋅
Detecting New MULTI#STORM Attack Campaign Involving Python-based Loader Masquerading as OneDrive Utilities to Drop Multiple RAT Payloads With Security Analytics Ave Maria |
2023-06-15
⋅
Cado Security
⋅
Tracking Diicot: an emerging Romanian threat actor |
2023-06-14
⋅
PICUS Security
⋅
Picus Cyber Threat Intelligence Report May 2023: Top 10 MITRE ATT&CK Techniques Earth Longzhi |
2023-06-14
⋅
VulnCheck
⋅
Fake Security Researcher GitHub Repositories Deliver Malicious Implant TorLoader |
2023-06-14
⋅
CISA
⋅
Understanding Ransomware Threat Actors: Lockbit LockBit |