Click here to download all references as Bib-File.•
2021-09-01
⋅
YouTube (Black Hat)
⋅
Threat Hunting in Active Directory Environment |
2021-09-01
⋅
YouTube (Black Hat)
⋅
Domain Borrowing: Catch My C2 Traffic if You Can |
2021-09-01
⋅
YouTube (Black Hat)
⋅
Mem2Img: Memory-Resident Malware Detection via Convolution Neural Network Cobalt Strike PlugX Waterbear |
2021-09-01
⋅
YouTube (Black Hat)
⋅
How Did the Adversaries Abusing the Bitcoin Blockchain Evade Our Takeover? Cerber Pony |
2021-08-20
⋅
YouTube (Black Hat)
⋅
The Kitten that Charmed Me: The 9 Lives of a Nation State Attacker LittleLooter |
2021-02-26
⋅
YouTube (Black Hat)
⋅
FASTCash and INJX_Pure: How Threat Actors Use Public Standards for Financial Fraud FastCash |