Datum | Název | Blog | Companies |
20.03.2021 | Cybereason Exposes Campaign Targeting US Taxpayers with NetWire and Remcos Malware | Malware blog | Cybereason |
20.03.2021 | Registration now open for Talos webinar on Android malware | Malware blog | Cisco Talos |
20.03.2021 | Beware Android trojan posing as Clubhouse app | Malware blog | Eset |
13.03.2021 | Attack Chain Overview: Emotet in December 2020 and January 2021 | Malware blog | Palo Alto Unity42 |
13.03.2021 | IcedID Banking Trojan Uses COVID-19 Pandemic to Lure New Victims | Malware blog | FireEye |
06.03.2021 | Avast reaches out to Ursnif malware victims | Malware blog | Avast blog |
06.03.2021 | Malicious Life Podcast: Inside NotPetya, Part 1 | Malware blog | Cybereason |
06.03.2021 | IcedID Banking Trojan Uses COVID-19 Pandemic to Lure New Victims | Malware blog | Cybereason |
06.03.2021 | New SUNSHUTTLE Second-Stage Backdoor Uncovered Targeting U.S.-Based Entity; Possible Connection to UNC2452 | Malware blog | FireEye |
06.03.2021 | ObliqueRAT returns with new campaign using hijacked websites | Malware blog | Cisco Talos |
19.02.2021 | IronNetInjector: Turla’s New Malware Loading Tool | Malware blog | Palo Alto Unity42 |
19.02.2021 | Malicious Life Podcast: Should Law Enforcement Use Facial Recognition? Pt. 1 | Malware blog | Cybereason |
19.02.2021 | Malware authors already taking aim at Apple M1 Macs | Malware blog | Eset |
12.02.2021 | Kasablanka Group's LodaRAT improves espionage capabilities on Android and Windows | Malware blog | Cisco Talos |
06.02.2021 | Hildegard: New TeamTNT Malware Targeting Kubernetes | Malware blog | Cybereason |
06.02.2021 | Kobalos – A complex Linux threat to high performance computing infrastructure | Malware blog | Eset |
30.01.2021 | Last Hurrah: Executive Order to Protect IaaS Platforms from Malicious Actors | Malware blog | Cybereason |
30.01.2021 | Training Transformers for Cyber Security Tasks: A Case Study on Malicious URL Prediction | Malware blog | FireEye |
23.01.2021 | Wireshark Tutorial: Examining Emotet Infection Traffic | Malware blog | Palo Alto Unity42 |
23.01.2021 | Emulation of Kernel Mode Rootkits With Speakeasy | Malware blog | FireEye |
23.01.2021 | Training Transformers for Cyber Security Tasks: A Case Study on Malicious URL Prediction | Malware blog | FireEye |
23.01.2021 | Vadokrist: A wolf in sheep’s clothing | Malware blog | Eset |
16.01.2021 | xHunt Campaign: New BumbleBee Webshell and SSH Tunnels Used for Lateral Movement | Malware blog | Palo Alto Unity42 |
16.01.2021 | Going Rogue- a Mastermind behind Android Malware Returns with a New RAT | Malware blog | Checkpoint |
09.01.2021 | TA551: Email Attack Campaign Switches from Valak to IcedID | Malware blog | Palo Alto Unity42 |
09.01.2021 | Stopping Serial Killer: Catching the Next Strike | Malware blog | Checkpoint |
09.01.2021 | A Deep Dive into Lokibot Infection Chain | Malware blog | Cisco Talos |