Click here to download all references as Bib-File.•
2024-10-16
⋅
Trend Micro
⋅
Fake LockBit, Real Damage: Ransomware Samples Abuse AWS S3 to Steal Data BockLit |
2023-05-19
⋅
Trend Micro
⋅
Rust-Based Info Stealers Abuse GitHub Codespaces DeltaStealer |
2022-09-12
⋅
Trend Micro
⋅
Security Breaks: TeamTNT’s DockerHub Credentials Leak |
2022-09-08
⋅
Trend Micro
⋅
How Malicious Actors Abuse Native Linux Tools in Attacks |
2022-04-20
⋅
Trend Micro
⋅
Analyzing Attempts to Exploit the Spring4Shell Vulnerability CVE-2022-22965 to Deploy Cryptocurrency Miners |
2022-04-08
⋅
Trend Micro
⋅
CVE-2022-22965: Analyzing the Exploitation of Spring4Shell Vulnerability in Weaponizing and Executing the Mirai Botnet Malware Mirai |
2021-12-03
⋅
Trend Micro
⋅
Vulnerabilities Exploited for Monero Mining Malware Delivered via GitHub, Netlify |
2021-04-16
⋅
Trend Micro
⋅
Could the Microsoft Exchange breach be stopped? CHINACHOPPER |