Click here to download all references as Bib-File.

Enter keywords to filter the library entries below or Propose new Entry
2024-06-05MandiantJamie Collier, Michelle Cantos
Phishing for Gold: Cyber Threats Facing the 2024 Paris Olympics
Callisto
2024-04-25MandiantJamie Collier, Kelli Vanderlee
Poll Vaulting: Cyber Threats to Global Elections
Callisto
2022-05-25CrowdStrikeJamie Harris
Hunting a Global Telecommunications Threat: DecisiveArchitect and Its Custom Implant JustForFun
BPFDoor
2021-10-19CrowdStrikeDan Meyer, Jamie Harris
LightBasin: A Roaming Threat to Telecommunications Companies
LightBasin
2021-07-07ElasticJamie Butler
Elastic Security prevents 100% of REvil ransomware samples
REvil
2021-03-06Click All the Things! BlogJamie Arndt
oleObject1.bin – OLe10nATive – shellcode
CloudEyE
2021-02-02Click All the Things! BlogJamie
XLSB: Analyzing a Microsoft Excel Binary Spreadsheet
2021-01-26Digital ShadowsJamie Hart
Ransomware: Analyzing the data from 2020
2020-12-16Click All the Things! BlogJamie
Snake/404 Keylogger, BIFF, and Covering Tracks?: An unusual maldoc
2020-12-02Kryptos LogicJamie Hankins
Automated string de-gobfuscation
Blackrota
2020-09-24Click All the Things! BlogJamie Arndt
zLoader XLM Update: Macro code and behavior change
Zloader
2020-06-19Click All the Things! BlogJamie
zloader: VBA, R1C1 References, and Other Tomfoolery
Zloader
2020-05-25ElasticBrent Murphy, David French, Jamie Butler
The Elastic Guide to Threat Hunting
2020-03-31Click All the Things! BlogJamie
LokiBot: Getting Equation Editor Shellcode
Loki Password Stealer (PWS)