Click here to download all references as Bib-File.•
2020-07-06
⋅
Tweets on Basbanke Basbanke |
2020-07-06
⋅
Cisco Talos
⋅
WastedLocker Goes "Big-Game Hunting" in 2020 WastedLocker |
2020-07-01
⋅
Fortinet
⋅
EKANS Ransomware Targeting OT ICS Systems Snake |
2020-06-22
⋅
FindingBad Blogspot
⋅
Dynamic Correlation, ML and Hunting |
2020-06-18
⋅
Medium Huntress Labs
⋅
Hiding In Plain Sight |
2020-06-17
⋅
Twitter (@VK_intel)
⋅
Tweet on signed Tinymet payload (V.02) used by TA505 TinyMet |
2020-06-09
⋅
Microsoft
⋅
Web shell threat hunting with Azure Sentinel and Microsoft Threat Protection |
2020-06-08
⋅
SentinelOne
⋅
A Guide to macOS Threat Hunting and Incident Response |
2020-06-02
⋅
Pwntario Blog
⋅
Hunting Malicious Macros |
2020-05-26
⋅
Youtube (GRIMM Cyber)
⋅
Passive DNS for Threat Detection & Hunting (Discussing some infrastructure related to APT32) METALJACK |
2020-05-25
⋅
Elastic
⋅
The Elastic Guide to Threat Hunting |
2020-05-15
⋅
SentinelOne
⋅
A Guide to macOS Threat Hunting and Incident Response |
2020-04-15
⋅
Twitter (MalwareHunterTeam)
⋅
Tweet on SpyMax sample SpyMax |
2020-04-14
⋅
Intrinsec
⋅
Deobfuscating and hunting for OSTAP, Trickbot’s dropper and best friend ostap TrickBot |
2020-04-13
⋅
Twitter (MalwareHunterTeam)
⋅
Tweet on XploitSPY XploitSPY |
2020-02-11
⋅
Twitter (@malwrhunterteam)
⋅
Tweet on Parallax RAT Parallax RAT |
2020-01-27
⋅
Palo Alto Networks Unit 42
⋅
xHunt Campaign: New Watering Hole Identified for Credential Harvesting |
2020-01-24
⋅
ReversingLabs
⋅
Hunting for Ransomware Ryuk |
2020-01-09
⋅
Twitter (@malwrhunterteam)
⋅
Tweet on BitPyLock BitPyLock |
2020-01-04
⋅
Medium d-hunter
⋅
A Look Into Konni 2019 Campaign Konni |