Click here to download all references as Bib-File.•
2024-04-11
⋅
Microsoft
⋅
How Microsoft discovers and mitigates evolving attacks against AI guardrails |
2024-03-14
⋅
Orange Cyberdefense
⋅
Unveiling the depths of residential proxies providers |
2024-03-14
⋅
Sekoia
⋅
Unveiling the depths of Residential Proxies providers |
2024-03-01
⋅
0x0v1
⋅
APT37's ROKRAT HWP Object Linking and Embedding RokRAT |
2024-01-23
⋅
Trend Micro
⋅
Kasseika Ransomware Deploys BYOVD Attacks, Abuses PsExec and Exploits Martini Driver Kasseika |
2023-10-30
⋅
MSSPAlert
⋅
Managed Security Services Provider (MSSP) Market News: 30 October 2023 WeRedEvils |
2023-10-15
⋅
⋅
Cert-UA
⋅
Peculiarities of destructive cyber attacks against Ukrainian providers (CERT-UA#7627) Poseidon UAC-0006 |
2023-09-25
⋅
0x0v1
⋅
REArchive: Reverse engineering APT37’s GOLDBACKDOOR dropper GOLDBACKDOOR |
2023-08-31
⋅
SystemError
⋅
Reverse engineering SuperBear RAT SuperBear RAT |
2023-07-24
⋅
Mandiant
⋅
North Korea Leverages SaaS Provider in a Targeted Supply Chain Attack FULLHOUSE STRATOFEAR TraderTraitor |
2023-06-06
⋅
Trend Micro
⋅
Xollam, the Latest Face of TargetCompany TargetCompany |
2023-04-28
⋅
Trend Micro
⋅
Rapture, a Ransomware Family With Similarities to Paradise Paradise |
2023-04-24
⋅
Trend Micro
⋅
ViperSoftX Updates Encryption, Steals Data ViperSoftX |
2023-04-20
⋅
Interlab
⋅
Uncovering nation state watering hole credential harvesting campaigns targeting human rights activists by APT threat group UCID902 |
2023-04-18
⋅
Trend Micro
⋅
An Analysis of the BabLock (aka Rorschach) Ransomware Rorschach Ransomware |
2023-04-18
⋅
Trend Micro
⋅
An Analysis of the BabLock (aka Rorschach) Ransomware (IoCs) Rorschach Ransomware |
2023-04-13
⋅
Trellix
⋅
Read The Manual Locker: A Private RaaS Provider RTM Locker |
2023-02-28
⋅
Fortinet
⋅
Can You See It Now? An Emerging LockBit Campaign LockBit |
2023-02-21
⋅
SecurityIntelligence
⋅
Direct Kernel Object Manipulation (DKOM) Attacks on ETW Providers FudModule |
2023-01-26
⋅
Trendmicro
⋅
New Mimic Ransomware Abuses Everything APIs for its Encryption Process Mimic Ransomware |