Click here to download all references as Bib-File.
2023-10-27 ⋅ Kaspersky ⋅ A cascade of compromise: unveiling Lazarus’ new campaign LPEClient PostNapTea |
2023-10-20 ⋅ Twitter (@embee_research) ⋅ Decoding a Cobalt Strike .hta Loader Using CyberChef and Emulation Cobalt Strike |
2023-10-18 ⋅ Twitter (@embee_research) ⋅ Ghidra Tutorial - Using Entropy To Locate a Cobalt Strike Decryption Function Cobalt Strike |
2023-10-12 ⋅ Cluster25 ⋅ CVE-2023-38831 Exploited by Pro-Russia Hacking Groups in RU-UA Conflict Zone for Credential Harvesting Operations Agent Tesla Crimson RAT Nanocore RAT SmokeLoader |
2023-09-12 ⋅ ANSSI ⋅ FIN12: A Cybercriminal Group with Multiple Ransomware BlackCat Cobalt Strike Conti Hive MimiKatz Nokoyawa Ransomware PLAY Royal Ransom Ryuk SystemBC |
2023-09-04 ⋅ AhnLab ⋅ CHM Malware Using Fukushima Contaminated Water Discharge: RedEyes (ScarCruft) |
2023-09-04 ⋅ Cert-UA ⋅ APT28 cyberattack: msedge as a bootloader, TOR and mockbin.org/website.hook services as a control center (CERT-UA#7469) |
2023-08-08 ⋅ Security Service of Ukraine ⋅ Cyber Operation of Russian Intelligence Services as a Component of Confrontation on the Battlefield |
2023-08-07 ⋅ SentinelOne ⋅ Comrades in Arms? | North Korea Compromises Sanctioned Russian Missile Engineering Company OpenCarrot |
2023-08-07 ⋅ Trend Micro ⋅ Latest Batloader Campaigns Use Pyarmor Pro for Evasion BATLOADER |
2023-07-25 ⋅ Zscaler ⋅ Hibernating Qakbot: A Comprehensive Study and In-depth Campaign Analysis QakBot |
2023-07-07 ⋅ Rapid7 Labs ⋅ Exploitation of Mitel MiVoice Connect SA CVE-2022-29499 |
2023-07-04 ⋅ The Record ⋅ Fort Worth officials say leaked data came from Public Information Act request |
2023-06-23 ⋅ Trendmicro ⋅ An Overview of the Different Versions of the Trigona Ransomware Trigona |
2023-06-06 ⋅ Security Intelligence ⋅ ITG10 Likely Targeting South Korean Entities of Interest to the Democratic People’s Republic of Korea (DPRK) RokRAT |
2023-05-18 ⋅ zimperium ⋅ Zimperium’s MTD Against OilAlpha: A Comprehensive Defense Strategy |
2023-05-16 ⋅ Check Point Research ⋅ The Dragon Who Sold his Camaro: Analyzing a Custom Router Implant Horse Shell |
2023-05-10 ⋅ Dragos ⋅ Deconstructing a Cybersecurity Event |
2023-05-04 ⋅ SecurityScorecard ⋅ How to Analyze Java Malware – A Case Study of STRRAT STRRAT |
2023-04-28 ⋅ Twitter (@MalGamy12) ⋅ Tweet explaning similarity between Conti and Akira code Akira |