Click here to download all references as Bib-File.
2022-07-20 ⋅ Trend Micro ⋅ Analyzing Penetration-Testing Tools That Threat Actors Use to Breach Systems and Steal Data |
2021-09-27 ⋅ Trend Micro ⋅ Fake Installers Drop Malware and Open Doors for Opportunistic Attackers RedLine Stealer Socelars Vidar |
2021-08-04 ⋅ Trend Micro ⋅ Supply Chain Attacks from a Managed Detection and Response Perspective REvil |
2018-11-20 ⋅ Trend Micro ⋅ Lazarus Continues Heists, Mounts Attacks on Financial Organizations in Latin America BLINDTOAD |