Click here to download all references as Bib-File.

Enter keywords to filter the library entries below or Propose new Entry
2023-09-25SecuronixD. Iuzvyk, Tim Peck, Oleg Kolesnikov
@online{iuzvyk:20230925:securonix:af6d775, author = {D. Iuzvyk and Tim Peck and Oleg Kolesnikov}, title = {{Securonix Threat Labs Security Advisory: New STARK#VORTEX Attack Campaign: Threat Actors Use Drone Manual Lures to Deliver MerlinAgent Payloads}}, date = {2023-09-25}, organization = {Securonix}, url = {https://www.securonix.com/blog/threat-labs-security-advisory-new-starkvortex-attack-campaign-threat-actors-use-drone-manual-lures-to-deliver-merlinagent-payloads/}, language = {English}, urldate = {2023-10-09} } Securonix Threat Labs Security Advisory: New STARK#VORTEX Attack Campaign: Threat Actors Use Drone Manual Lures to Deliver MerlinAgent Payloads
Merlin
2022-09-28SecuronixD. Iuzvyk, T. Peck, O. Kolesnikov
@online{iuzvyk:20220928:securonix:7e14e6e, author = {D. Iuzvyk and T. Peck and O. Kolesnikov}, title = {{Securonix Threat Labs Security Advisory: Detecting STEEP#MAVERICK: New Covert Attack Campaign Targeting Military Contractors}}, date = {2022-09-28}, organization = {Securonix}, url = {https://www.securonix.com/blog/detecting-steepmaverick-new-covert-attack-campaign-targeting-military-contractors/}, language = {English}, urldate = {2022-09-30} } Securonix Threat Labs Security Advisory: Detecting STEEP#MAVERICK: New Covert Attack Campaign Targeting Military Contractors
2022-08-29SecuronixD. Iuzvyk, T. Peck, O. Kolesnikov
@online{iuzvyk:20220829:securonix:a15320a, author = {D. Iuzvyk and T. Peck and O. Kolesnikov}, title = {{Securonix Threat Labs Security Advisory: New Golang Attack Campaign GO#WEBBFUSCATOR Leverages Office Macros and James Webb Images to Infect Systems}}, date = {2022-08-29}, organization = {Securonix}, url = {https://www.securonix.com/blog/golang-attack-campaign-gowebbfuscator-leverages-office-macros-and-james-webb-images-to-infect-systems/}, language = {English}, urldate = {2022-09-01} } Securonix Threat Labs Security Advisory: New Golang Attack Campaign GO#WEBBFUSCATOR Leverages Office Macros and James Webb Images to Infect Systems
2022-07-20Securonix Threat LabsD. Iuzvyk, T. Peck, O. Kolesnikov
@online{iuzvyk:20220720:stiffbizon:ae896da, author = {D. Iuzvyk and T. Peck and O. Kolesnikov}, title = {{STIFF#BIZON Detection Using Securonix – New Attack Campaign Observed Possibly Linked to Konni/APT37 (North Korea) - Securonix}}, date = {2022-07-20}, organization = {Securonix Threat Labs}, url = {https://www.securonix.com/blog/stiffbizon-detection-new-attack-campaign-observed/}, language = {English}, urldate = {2022-07-25} } STIFF#BIZON Detection Using Securonix – New Attack Campaign Observed Possibly Linked to Konni/APT37 (North Korea) - Securonix
Konni
2022-03SecuronixSecuronix Threat Labs
@online{labs:202203:detecting:6136462, author = {Securonix Threat Labs}, title = {{Detecting the EnemyBot Botnet – Securonix Initial Coverage Advisory}}, date = {2022-03}, organization = {Securonix}, url = {https://www.securonix.com/blog/detecting-the-enemybot-botnet-advisory}, language = {English}, urldate = {2022-04-07} } Detecting the EnemyBot Botnet – Securonix Initial Coverage Advisory
EnemyBot