Click here to download all references as Bib-File.
2023-09-20 ⋅ Proofpoint ⋅ Chinese Malware Appears in Earnest Across Cybercrime Threat Landscape FatalRat PurpleFox ValleyRAT |
2023-07-25 ⋅ splunk ⋅ Amadey Threat Analysis and Detections Amadey |
2023-06-29 ⋅ Avast Decoded ⋅ Decrypted: Akira Ransomware Akira |
2023-03-31 ⋅ splunk ⋅ Splunk Insights: Investigating the 3CXDesktopApp Supply Chain Compromise 3CX Backdoor |
2023-03-27 ⋅ splunk ⋅ AsyncRAT Crusade: Detections and Defense AsyncRAT |
2023-03-15 ⋅ Reliaquest ⋅ QBot: Laying the Foundations for Black Basta Ransomware Activity Black Basta QakBot |
2023-02-16 ⋅ EclecticIQ ⋅ Three Cases of Cyber Attacks on the Security Service of Ukraine and NATO Allies, Likely by Russian State-Sponsored Gamaredon |
2023-02-02 ⋅ EclecticIQ ⋅ Mustang Panda APT Group Uses European Commission-Themed Lure to Deliver PlugX Malware PlugX |
2023-01-25 ⋅ Proofpoint ⋅ TA444: The APT Startup Aimed at Acquisition (of Your Funds) CageyChameleon |
2023-01-12 ⋅ EclecticIQ ⋅ QakBot Malware Used Unpatched Vulnerability to Bypass Windows OS Security Feature QakBot |
2022-12-01 ⋅ splunk ⋅ From Macros to No Macros: Continuous Malware Improvements by QakBot QakBot |
2022-11-22 ⋅ Proofpoint ⋅ Nighthawk: An Up-and-Coming Pentest Tool Likely to Gain Threat Actor Notice Nighthawk |
2022-11-16 ⋅ splunk ⋅ Inside the Mind of a ‘Rat’ - Agent Tesla Detection and Analysis Agent Tesla |
2022-10-04 ⋅ splunk ⋅ Deliver a Strike by Reversing a Badger: Brute Ratel Detection and Analysis Brute Ratel C4 |
2022-09-13 ⋅ Sansec Threat Research ⋅ Magento vendor Fishpig hacked, backdoors added Rekoobe |
2022-08-25 ⋅ splunk ⋅ AppLocker Rules as Defense Evasion: Complete Analysis Azorult |
2022-08-18 ⋅ Proofpoint ⋅ Reservations Requested: TA558 Targets Hospitality and Travel AsyncRAT Loda NjRAT Ozone RAT Revenge RAT Vjw0rm |
2022-08-15 ⋅ Microsoft ⋅ Disrupting SEABORGIUM’s ongoing phishing operations Callisto |
2022-08-15 ⋅ Microsoft ⋅ Disrupting SEABORGIUM’s ongoing phishing operations |
2022-07-26 ⋅ splunk ⋅ ML Detection of Risky Command Exploit |