Click here to download all references as Bib-File.•
2023-06-14
⋅
CISA
⋅
Understanding Ransomware Threat Actors: Lockbit LockBit |
2022-04-27
⋅
CISA
⋅
Alert (AA22-117A) 2021 Top Routinely Exploited Vulnerabilities |
2022-04-20
⋅
CISA
⋅
AA22-110A Joint CSA: Russian State-Sponsored and Criminal Cyber Threats to Critical Infrastructure VPNFilter BlackEnergy DanaBot DoppelDridex Emotet EternalPetya GoldMax Industroyer Sality SmokeLoader TrickBot Triton Zloader |
2021-12-22
⋅
CISA
⋅
Alert (AA21-356A) Mitigating Log4Shell and Other Log4j-Related Vulnerabilities |
2021-08-22
⋅
⋅
media.ccc.de
⋅
The Bangladesh cyber bank robbery: Tracking down major criminals with malware analysis DYEPACK |
2021-02-22
⋅
National Security and Defense Council of Ukraine
⋅
The NCCC at the NSDC of Ukraine warns of a new mechanism of attacks on Ukrainian infrastructure |
2016-12-27
⋅
CCC
⋅
Pegasus internals: Technical Teardown of the Pegasus malware and Trident exploit chain Chrysaor |
2011-10-08
⋅
CCC
⋅
ANALYSE EINER REGIERUNGS-MALWARE Bundestrojaner |
2010-12-27
⋅
media.ccc.de
⋅
Adventures in analyzing Stuxnet Stuxnet |