Click here to download all references as Bib-File.•
2021-08-17
⋅
Medium michaelkoczwara
⋅
Cobalt Strike Hunting — DLL Hijacking/Attack Analysis Cobalt Strike |
2021-07-30
⋅
Medium walmartglobaltech
⋅
Decrypting BazarLoader strings with a Unicorn BazarBackdoor |
2021-07-25
⋅
Medium svch0st
⋅
Guide to Named Pipes and Hunting for Cobalt Strike Pipes Cobalt Strike |
2021-07-22
⋅
Medium michaelkoczwara
⋅
Cobalt Strike Hunting — simple PCAP and Beacon Analysis Cobalt Strike |
2021-07-14
⋅
Medium TowardsDataScience
⋅
Domain Blooms: Identifying Domain Name Themes Targeted By Threat Actors |
2021-07-14
⋅
Medium s2wlab
⋅
Matryoshka : Variant of ROKRAT, APT37 (Scarcruft) RokRAT |
2021-07-13
⋅
Medium CyCraft
⋅
Prometheus Ransomware Decryptor Prometheus |
2021-07-08
⋅
Medium s2wlab
⋅
Analysis of Lazarus malware abusing Non-ActiveX Module in South Korea Racket Downloader |
2021-07-08
⋅
Medium walmartglobaltech
⋅
Amadey stealer plugin adds Mikrotik and Outlook harvesting Amadey |
2021-07-08
⋅
Medium walmartglobaltech
⋅
Amadey stealer plugin adds Mikrotik and Outlook harvesting Amadey |
2021-07-07
⋅
Medium s2wlab
⋅
Deep analysis of KPOT Stealer KPOT Stealer |
2021-07-06
⋅
Medium walmartglobaltech
⋅
TA505 adds GoLang crypter for delivering miners and ServHelper ServHelper |
2021-07-06
⋅
Medium walmartglobaltech
⋅
TA505 adds GoLang crypter for delivering miners and ServHelper ServHelper |
2021-07-03
⋅
Medium AK1001
⋅
Analyzing Cobalt Strike PowerShell Payload Cobalt Strike |
2021-07-03
⋅
Medium Doublepulsar
⋅
Kaseya supply chain attack delivers mass ransomware event to US companies REvil |
2021-06-29
⋅
Medium hidocohen
⋅
GuLoader’s Anti-Analysis Techniques CloudEyE |
2021-06-29
⋅
Medium MITRE-Engenuity
⋅
Security Control Mappings: A Starting Point for Threat-Informed Defense |
2021-06-29
⋅
Medium MITRE-Engenuity
⋅
Security Control Mappings: A Starting Point for Threat-Informed Defense |
2021-06-23
⋅
⋅
Medium s2wlab
⋅
Deep analysis of REvil Ransomware REvil |
2021-06-21
⋅
Medium gabrielcurrie
⋅
Ready for (nearly) anything: Five things to prepare for a cyber security incident |