Click here to download all references as Bib-File.
2022-11-10 ⋅ Intezer ⋅ How LNK Files Are Abused by Threat Actors BumbleBee Emotet Mount Locker QakBot |
2022-07-06 ⋅ Intezer ⋅ OrBit: New Undetected Linux Threat Uses Unique Hijack of Execution Flow HiddenWasp OrBit Symbiote |
2022-04-04 ⋅ Intezer ⋅ Elephant Framework Delivered in Phishing Attacks Against Ukrainian Organizations GraphSteel GrimPlant SaintBear |
2022-01-11 ⋅ Intezer ⋅ New SysJoker Backdoor Targets Windows, Linux, and macOS SysJoker SysJoker SysJoker |
2021-07-07 ⋅ Intezer ⋅ Global Phishing Campaign Targets Energy Sector and its Suppliers |
2021-04-06 ⋅ Intezer ⋅ Rocke Group Actively Targeting the Cloud: Wants Your SSH Keys |
2021-01-13 ⋅ Intezer ⋅ A Rare Look Inside a Cryptojacking Campaign and its Profit |
2020-10-01 ⋅ Intezer ⋅ A Storm is Brewing: IPStorm Now Has Linux Malware IPStorm |
2020-09-08 ⋅ Intezer ⋅ Attackers Abusing Legitimate Cloud Monitoring Tools to Conduct Cyber Attacks |
2020-07-28 ⋅ Intezer ⋅ Watch Your Containers: Doki Infecting Docker Servers in the Cloud Doki |