Click here to download all references as Bib-File.
2021-12-23 ⋅ Elastic ⋅ Elastic Security uncovers BLISTER malware campaign Blister |
2021-10-12 ⋅ Elastic ⋅ Going Coast to Coast - Climbing the Pyramid with the Deimos Implant Deimos |
2021-07-27 ⋅ Elastic ⋅ Collecting and operationalizing threat data from the Mozi botnet Mozi |
2021-07-07 ⋅ Elastic ⋅ Elastic Security prevents 100% of REvil ransomware samples REvil |
2021-06-15 ⋅ Elastic ⋅ What you need to know about Process Ghosting, a new executable image tampering attack |
2021-05-18 ⋅ Elastic ⋅ ProblemChild: Detecting living-off-the-land attacks using the Elastic Stack |
2021-04-20 ⋅ Elastic ⋅ How attackers abuse Access Token Manipulation (ATT&CK T1134) |
2021-03-27 ⋅ InfoSec Handlers Diary Blog ⋅ Malware Analysis with elastic-agent and Microsoft Sandbox |
2021-03-18 ⋅ Elastic ⋅ Hunting for Lateral Movement using Event Query Language |
2021-03-16 ⋅ Elastic ⋅ Detecting Cobalt Strike with memory signatures Cobalt Strike |
2021-03-11 ⋅ Elastic ⋅ Update - Detection and Response for HAFNIUM Activity |
2021-03-09 ⋅ 360 netlab ⋅ Threat Alert: z0Miner Is Spreading quickly by Exploiting ElasticSearch and Jenkins Vulnerabilities |
2021-03-04 ⋅ Elastic ⋅ Detection and Response for HAFNIUM Activity HAFNIUM |
2020-12-18 ⋅ Elastic ⋅ Combining supervised and unsupervised machine learning for DGA detection SUNBURST |
2020-06-30 ⋅ Github (elastic) ⋅ Detection Rules by Elastic |
2020-06-25 ⋅ Elastic ⋅ A close look at the advanced techniques used in a Malaysian-focused APT campaign DADSTACHE APT40 |
2020-05-25 ⋅ Elastic ⋅ The Elastic Guide to Threat Hunting |
2020-02-13 ⋅ Elastic ⋅ Playing defense against Gamaredon Group Pteranodon |
2019-12-04 ⋅ Elastic ⋅ Ransomware, interrupted: Sodinokibi and the supply chain REvil |
2017-07-18 ⋅ Elastic ⋅ Ten process injection techniques: A technical survey of common and trending process injection techniques Almanahe Diztakun Ginwui |