Click here to download all references as Bib-File.
2022-03-11 ⋅ Malware Posing as Russia DDoS Tool Bites Ukraine Hackers |
2021-09-01 ⋅ YouTube (Black Hat) ⋅ Domain Borrowing: Catch My C2 Traffic if You Can |
2021-09-01 ⋅ YouTube (Black Hat) ⋅ Threat Hunting in Active Directory Environment |
2021-09-01 ⋅ YouTube (Black Hat) ⋅ How Did the Adversaries Abusing the Bitcoin Blockchain Evade Our Takeover? Cerber Pony |
2021-09-01 ⋅ YouTube (Black Hat) ⋅ Mem2Img: Memory-Resident Malware Detection via Convolution Neural Network Cobalt Strike PlugX Waterbear |
2021-08-20 ⋅ YouTube (Black Hat) ⋅ The Kitten that Charmed Me: The 9 Lives of a Nation State Attacker LittleLooter |
2021-05-06 ⋅ Black Hat ⋅ How Did the Adversaries Abusing Bitcoin Blockchain Evade Our Takeover Cerber Pony |
2021-05-06 ⋅ Black Hat ⋅ Threat Hunting in Active Directory Environment |
2021-02-26 ⋅ YouTube (Black Hat) ⋅ FASTCash and INJX_Pure: How Threat Actors Use Public Standards for Financial Fraud FastCash |
2017-08-22 ⋅ ESET Research ⋅ Gamescom 2017: It’s all fun and games until black hats step in Joao |
2016-08 ⋅ Black Hat ⋅ Iran and the Soft Warfor Internet Dominance Infy Sima |
2015-08-05 ⋅ Black Hat ⋅ Gameover Zeus – Bad Guys and Backends Gameover P2P |