Click here to download all references as Bib-File.•
2023-10-07
⋅
Cybereason
⋅
Taking Shortcuts: Using LNK files for initial infection and persistence |
2023-02-14
⋅
Cybereason
⋅
GootLoader - SEO Poisoning and Large Payloads Leading to Compromise GootLoader Cobalt Strike SystemBC |
2022-12-14
⋅
Cybereason
⋅
Royal Rumble: Analysis of Royal Ransomware Royal Ransom |
2022-12-14
⋅
Cybereason
⋅
Royal Rumble: Analysis of Royal Ransomware Royal Ransom |
2022-12-14
⋅
Cybereason
⋅
Royal Rumble: Analysis of Royal Ransomware Royal Ransom |
2022-12-05
⋅
Cybereason
⋅
Threat Analysis: MSI - Masquerading as a Software Installer Magniber Matanbuchus QakBot |
2022-12-05
⋅
Cybereason
⋅
Threat Analysis: MSI - Masquerading as a Software Installer Magniber Matanbuchus QakBot |
2022-12-05
⋅
Cybereason
⋅
Threat Analysis: MSI - Masquerading as a Software Installer Magniber Matanbuchus QakBot |
2022-11-23
⋅
Cybereason
⋅
THREAT ALERT: Aggressive Qakbot Campaign and the Black Basta Ransomware Group Targeting U.S. Companies Black Basta QakBot |
2022-09-14
⋅
Cybereason
⋅
THREAT ANALYSIS REPORT: Abusing Notepad++ Plugins for Evasion and Persistence Meterpreter |
2022-09-14
⋅
Cybereason
⋅
THREAT ANALYSIS REPORT: Abusing Notepad++ Plugins for Evasion and Persistence Meterpreter |
2022-09-08
⋅
Cybereason
⋅
Threat Analysis Report: PlugX RAT Loader Evolution PlugX |
2022-09-08
⋅
Cybereason
⋅
Threat Analysis Report: PlugX RAT Loader Evolution PlugX |
2022-09-08
⋅
Cybereason
⋅
Threat Analysis Report: PlugX RAT Loader Evolution PlugX |
2022-08-19
⋅
Cybereason
⋅
THREAT ALERT: Inside the Redeemer 2.0 Ransomware |
2022-08-17
⋅
Cybereason
⋅
Bumblebee Loader – The High Road to Enterprise Domain Control BumbleBee Cobalt Strike |
2022-07-07
⋅
Cybereason
⋅
THREAT ANALYSIS REPORT: LockBit 2.0 - All Paths Lead to Ransom LockBit |
2022-07-07
⋅
Cybereason
⋅
THREAT ALERT: Raspberry Robin Worm Abuses Windows Installer and QNAP Devices Raspberry Robin |
2022-05-09
⋅
Cybereason
⋅
Cybereason vs. Quantum Locker Ransomware IcedID Mount Locker |
2022-05-04
⋅
Cybereason
⋅
Operation CuckooBees: Deep-Dive into Stealthy Winnti Techniques PRIVATELOG Spyder STASHLOG Winnti |