Click here to download all references as Bib-File.•
| 2024-08-19
⋅
Aon
⋅
Unveiling "sedexp": A Stealthy Linux Malware Exploiting udev Rules sedexp |
| 2023-09-15
⋅
CyberCX
⋅
Weaponising VMs to bypass EDR – Akira ransomware Akira |
| 2023-07-21
⋅
Checkmarx
⋅
First Known Targeted OSS Supply Chain Attacks Against the Banking Sector Havoc |
| 2023-06-02
⋅
Mandiant
⋅
Zero-Day Vulnerability in MOVEit Transfer Exploited for Data Theft |
| 2023-02-03
⋅
Aon
⋅
AgentVX And Taurus Taurus Stealer |
| 2023-01-16
⋅
Twitter (@zachxbt)
⋅
Tweet on ETH movement of Lazarus |
| 2022-03-21
⋅
Proofpoint
⋅
Serpent, No Swiping! New Backdoor Targets French Entities with Unique Attack Chain Serpent |
| 2022-01-19
⋅
Recorded Future
⋅
The People's Liberation Army in the South China Sea: An Organizational Guide |
| 2021-12-31
⋅
victory medium
⋅
Compromised Godaddy Infrastructure Attacking Numerous U.S. Government Websites to Promote “Canadian Pharmacy” Scam Websites |
| 2021-10-07
⋅
Mandiant
⋅
FIN12: The Prolific Ransomware Intrusion Threat Actor That Has Aggressively Pursued Healthcare Targets BazarBackdoor GRIMAGENT Ryuk |
| 2021-07-04
⋅
Twitter (@svch0st)
⋅
Tweet on #Kaseya detection tool for detecting REvil REvil |
| 2021-06-10
⋅
ZEIT Online
⋅
On the Trail of the Internet Extortionists Emotet Mailto |
| 2021-02-09
⋅
Cofense
⋅
BazarBackdoor’s Stealthy Infiltration Evades Multiple SEGs BazarBackdoor |
| 2021-01-28
⋅
axios
⋅
In cyber espionage, U.S. is both hunted and hunter |
| 2020-07-15
⋅
Yahoo News
⋅
Exclusive: Secret Trump order gives CIA more powers to launch cyberattacks |