Click here to download all references as Bib-File.•
2024-06-05
⋅
Mandiant
⋅
Phishing for Gold: Cyber Threats Facing the 2024 Paris Olympics Callisto |
2024-04-25
⋅
Mandiant
⋅
Poll Vaulting: Cyber Threats to Global Elections Callisto |
2022-05-25
⋅
CrowdStrike
⋅
Hunting a Global Telecommunications Threat: DecisiveArchitect and Its Custom Implant JustForFun BPFDoor |
2021-10-19
⋅
CrowdStrike
⋅
LightBasin: A Roaming Threat to Telecommunications Companies LightBasin |
2021-07-07
⋅
Elastic
⋅
Elastic Security prevents 100% of REvil ransomware samples REvil |
2021-03-06
⋅
Click All the Things! Blog
⋅
oleObject1.bin – OLe10nATive – shellcode CloudEyE |
2021-02-02
⋅
Click All the Things! Blog
⋅
XLSB: Analyzing a Microsoft Excel Binary Spreadsheet |
2021-01-26
⋅
Digital Shadows
⋅
Ransomware: Analyzing the data from 2020 |
2020-12-16
⋅
Click All the Things! Blog
⋅
Snake/404 Keylogger, BIFF, and Covering Tracks?: An unusual maldoc |
2020-12-02
⋅
Kryptos Logic
⋅
Automated string de-gobfuscation Blackrota |
2020-09-24
⋅
Click All the Things! Blog
⋅
zLoader XLM Update: Macro code and behavior change Zloader |
2020-06-19
⋅
Click All the Things! Blog
⋅
zloader: VBA, R1C1 References, and Other Tomfoolery Zloader |
2020-05-25
⋅
Elastic
⋅
The Elastic Guide to Threat Hunting |
2020-03-31
⋅
Click All the Things! Blog
⋅
LokiBot: Getting Equation Editor Shellcode Loki Password Stealer (PWS) |