Click here to download all references as Bib-File.•
2023-01-05
⋅
Logpoint
⋅
A crowning achievement: Exploring the exploit of Royal ransomware Royal Ransom |
2023-01-05
⋅
Mandiant
⋅
Turla: A Galaxy of Opportunity KopiLuwak Andromeda QUIETCANARY |
2023-01-04
⋅
CSO Online
⋅
Cyberattacks against governments jumped 95% in last half of 2022, CloudSek says BlueHornet |
2023-01-04
⋅
Avertium
⋅
An In-Depth Look at PLAY Ransomware PLAY |
2023-01-04
⋅
Bleeping Computer
⋅
Rackspace confirms Play ransomware was behind recent cyberattack PLAY |
2023-01-04
⋅
PRODAFT
⋅
UNC1151 Group Indicators of Compromise (IOC) |
2023-01-04
⋅
K7 Security
⋅
Pupy RAT hiding under WerFault’s cover pupy |
2023-01-03
⋅
Qualys
⋅
BitRAT Now Sharing Sensitive Bank Data as a Lure BitRAT |
2023-01-01
⋅
ThreatMon
⋅
APT41's Attack Chain: Exe-LolBins Leads to Powershell Backdoor with Telegram C2 |
2023-01-01
⋅
ThreatMon
⋅
APT Blind Eagles Malware Arsenal Technical Analysis LimeRAT |
2023-01-01
⋅
ThreatMon
⋅
The Rise of Dark Power: A Close Look at the Group and their Ransomware |
2023-01-01
⋅
ThreatMon
⋅
Zaraza Bot: The New Russian Credential Stealer |
2023-01-01
⋅
ThreatMon
⋅
Reverse Engineering RokRAT: A Closer Look at APT37’s Onedrive-Based Attack Vector RokRAT |
2023-01-01
⋅
ThreatMon
⋅
Threat Analysis: SharpPanda APT’s Attack Chain Targeting G20 Nations |
2023-01-01
⋅
ThreatMon
⋅
Technical Analysis of RDPCredentialStealer: Uncovering Malware Targeting RDP Credentials with API Hooking |
2023-01-01
⋅
ThreatMon
⋅
Unraveling the Complex Infection Chain: Analysis of the SideCopy APT's Attack Action RAT |
2023-01-01
⋅
ThreatMon
⋅
From Slides to Threats: Transparent Tribe’s New Attack on Indian Government Entities Using Malicious PPT |
2023-01-01
⋅
ThreatMon
⋅
Solving the Puzzle: Reversing the New Stealer Jigsaw Jigsaw |
2023-01-01
⋅
ThreatMon
⋅
Unmasking Stealer X1na: A Technical Analysis of the Latest Threat |
2023-01-01
⋅
ThreatMon
⋅
NestJS Stealer: Unraveling the Inner Workings of a New Cybersecurity Menace |