Click here to download all references as Bib-File.
2021-02-25 ⋅ Recorded Future ⋅ The Business of Fraud: An Overview of How Cybercrime Gets Monetized |
2021-01-07 ⋅ Recorded Future ⋅ Aversary Infrastructure Report 2020: A Defender's View Octopus pupy Cobalt Strike Empire Downloader Meterpreter PoshC2 |
2020-12-10 ⋅ Recorded Future ⋅ Exploit Kits though in Decline, Remain Powerful Tool for Delivering Malware |
2020-12-04 ⋅ Recorded Future ⋅ Tibet and Taiwan Targeted in Spearphishing Campaigns Using MESSAGEMANIFOLD Malware |
2020-12-03 ⋅ Recorded Future ⋅ Egregor Ransomware, Used in a String of High-Profile Attacks, Shows Connections to QakBot Egregor QakBot |
2020-11-10 ⋅ Recorded Future ⋅ New APT32 Malware Campaign Targets Cambodian Government KerrDown METALJACK SOUNDBITE |
2020-11-04 ⋅ Recorded Future ⋅ Ransomware-as-a-Service Becomes Increasingly Accessible via Social Media and Open Sources |
2020-10-27 ⋅ Recorded Future ⋅ Pulse Report:Insikt Group Discovers Global Credential Harvesting Campaign Using FiercePhish Open Source Framework |
2020-10-16 ⋅ Recorded Future ⋅ Banking Web Injects Are Top Cyber Threat For Financial Sector Cerberus |
2020-09-15 ⋅ Recorded Future ⋅ Back Despite Disruption: RedDelta Resumes Operations PlugX |
2020-09-03 ⋅ Recorded Future ⋅ Russian-related Threats to the 2020 U.S. Presidential Election |
2020-06-10 ⋅ Recorded Future ⋅ New Ransomware-as-a-Service Tool ‘Thanos’ Shows Connections to ‘Hakbit Hakbit |