Click here to download all references as Bib-File.
2022-05-17 ⋅ Elastic ⋅ A peek behind the BPFDoor BPFDoor |
2022-05-05 ⋅ Elastic ⋅ BLISTER Loader Blister |
2022-03-07 ⋅ Elastic ⋅ PHOREAL Malware Targets the Southeast Asian Financial Sector PHOREAL |
2022-03-01 ⋅ Elastic ⋅ Elastic protects against data wiper malware targeting Ukraine: HERMETICWIPER HermeticWiper |
2022-02-07 ⋅ Elastic ⋅ Exploring Windows UAC Bypasses: Techniques and Detection Strategies |
2022-02-02 ⋅ Elastic ⋅ Sandboxing Antimalware Products for Fun and Profit |
2022-01-19 ⋅ Elastic ⋅ Operation Bleeding Bear WhisperGate |
2022-01-19 ⋅ Elastic ⋅ Collecting Cobalt Strike Beacons with the Elastic Stack Cobalt Strike |
2022-01-19 ⋅ Elastic ⋅ Extracting Cobalt Strike Beacon Configurations Cobalt Strike |
2022-01-18 ⋅ Elastic ⋅ FORMBOOK Adopts CAB-less Approach Formbook |
2021-12-23 ⋅ Elastic ⋅ Elastic Security uncovers BLISTER malware campaign Blister |
2021-10-12 ⋅ Elastic ⋅ Going Coast to Coast - Climbing the Pyramid with the Deimos Implant Deimos |
2021-07-27 ⋅ Elastic ⋅ Collecting and operationalizing threat data from the Mozi botnet Mozi |
2021-07-07 ⋅ Elastic ⋅ Elastic Security prevents 100% of REvil ransomware samples REvil |
2021-06-15 ⋅ Elastic ⋅ What you need to know about Process Ghosting, a new executable image tampering attack |
2021-05-18 ⋅ Elastic ⋅ ProblemChild: Detecting living-off-the-land attacks using the Elastic Stack |
2021-04-20 ⋅ Elastic ⋅ How attackers abuse Access Token Manipulation (ATT&CK T1134) |
2021-03-27 ⋅ InfoSec Handlers Diary Blog ⋅ Malware Analysis with elastic-agent and Microsoft Sandbox |
2021-03-18 ⋅ Elastic ⋅ Hunting for Lateral Movement using Event Query Language |
2021-03-16 ⋅ Elastic ⋅ Detecting Cobalt Strike with memory signatures Cobalt Strike |