Click here to download all references as Bib-File.•
2024-08-19
⋅
Aon
⋅
Unveiling "sedexp": A Stealthy Linux Malware Exploiting udev Rules sedexp |
2023-09-15
⋅
CyberCX
⋅
Weaponising VMs to bypass EDR – Akira ransomware Akira |
2023-07-21
⋅
Checkmarx
⋅
First Known Targeted OSS Supply Chain Attacks Against the Banking Sector Havoc |
2023-06-02
⋅
Mandiant
⋅
Zero-Day Vulnerability in MOVEit Transfer Exploited for Data Theft |
2023-02-03
⋅
Aon
⋅
AgentVX And Taurus Taurus Stealer |
2023-01-16
⋅
Twitter (@zachxbt)
⋅
Tweet on ETH movement of Lazarus |
2022-03-21
⋅
Proofpoint
⋅
Serpent, No Swiping! New Backdoor Targets French Entities with Unique Attack Chain Serpent |
2022-01-19
⋅
Recorded Future
⋅
The People's Liberation Army in the South China Sea: An Organizational Guide |
2021-12-31
⋅
victory medium
⋅
Compromised Godaddy Infrastructure Attacking Numerous U.S. Government Websites to Promote “Canadian Pharmacy” Scam Websites |
2021-10-07
⋅
Mandiant
⋅
FIN12: The Prolific Ransomware Intrusion Threat Actor That Has Aggressively Pursued Healthcare Targets BazarBackdoor GRIMAGENT Ryuk |
2021-07-04
⋅
Twitter (@svch0st)
⋅
Tweet on #Kaseya detection tool for detecting REvil REvil |
2021-06-10
⋅
ZEIT Online
⋅
On the Trail of the Internet Extortionists Emotet Mailto |
2021-02-09
⋅
Cofense
⋅
BazarBackdoor’s Stealthy Infiltration Evades Multiple SEGs BazarBackdoor |
2021-01-28
⋅
axios
⋅
In cyber espionage, U.S. is both hunted and hunter |
2020-07-15
⋅
Yahoo News
⋅
Exclusive: Secret Trump order gives CIA more powers to launch cyberattacks |