Click here to download all references as Bib-File.•
2023-05-15
⋅
CrowdStrike
⋅
Hypervisor Jackpotting, Part 3: Lack of Antivirus Support Opens the Door to Adversary Attacks BlackCat SystemBC |
2023-04-16
⋅
YouTube (botconf eu)
⋅
Tracking Bumblebee’s Development BumbleBee |
2023-03-30
⋅
CrowdStrike
⋅
2023-03-29 // SITUATIONAL AWARENESS // CrowdStrike Tracking Active Intrusion Campaign Targeting 3CX Customers 3CX Backdoor |
2023-03-29
⋅
CrowdStrike
⋅
CrowdStrike Falcon Platform Detects and Prevents Active Intrusion Campaign Targeting 3CXDesktopApp Customers 3CX Backdoor |
2023-03-14
⋅
CrowdStrike
⋅
The Zeus Trojan Malware - Definition and Prevention Zeus |
2023-03-02
⋅
CrowdStrike
⋅
Crowdstrike Global Threat Report 2023 |
2023-03-01
⋅
CrowdStrike
⋅
Slippy Spider LAPSUS |
2022-12-19
⋅
CrowdStrike
⋅
Malware Analysis: GuLoader Dissection Reveals New Anti-Analysis Techniques and Code Injection Redundancy CloudEyE |
2022-12-02
⋅
CrowdStrike
⋅
Not a SIMulation: CrowdStrike Investigations Reveal Intrusion Campaign Targeting Telco and BPO Companies |
2022-10-26
⋅
CrowdStrike
⋅
CrowdStrike Identifies New Kiss-a-Dog Cryptojacking Campaign Targeting Vulnerable Docker and Kubernetes Infrastructure xmrig Kiss-a-Dog |
2022-09-26
⋅
CrowdStrike
⋅
The Anatomy of Wiper Malware, Part 3: Input/Output Controls CaddyWiper DEADWOOD DistTrack DoubleZero DUSTMAN HermeticWiper IsaacWiper Meteor Petya Sierra(Alfa,Bravo, ...) StoneDrill WhisperGate ZeroCleare |
2022-08-24
⋅
CrowdStrike
⋅
The Anatomy of Wiper Malware, Part 2: Third-Party Drivers |
2022-08-12
⋅
CrowdStrike
⋅
The Anatomy of Wiper Malware, Part 1: Common Techniques Apostle CaddyWiper DEADWOOD DistTrack DoubleZero DUSTMAN HermeticWiper IsaacWiper IsraBye KillDisk Meteor Olympic Destroyer Ordinypt Petya Sierra(Alfa,Bravo, ...) StoneDrill WhisperGate ZeroCleare |
2022-06-23
⋅
CrowdStrike
⋅
The Call Is Coming from Inside the House: CrowdStrike Identifies Novel Exploit in VOIP Appliance (CVE-2022-29499) |
2022-06-02
⋅
CrowdStrike
⋅
CrowdStrike Uncovers New MacOS Browser Hijacking Campaign Choziosi |
2022-05-25
⋅
CrowdStrike
⋅
Hunting a Global Telecommunications Threat: DecisiveArchitect and Its Custom Implant JustForFun BPFDoor |
2022-05-20
⋅
CrowdStrike
⋅
Mirai Malware Variants for Linux Double Down on Stronger Chips in Q1 2022 Mirai |
2022-05-11
⋅
CrowdStrike
⋅
IceApple: A Novel Internet Information Services (IIS) Post-Exploitation Framework |
2022-05-11
⋅
CrowdStrike
⋅
Proactive Threat Hunting Bears Fruit: Falcon OverWatch Detects Novel IceApple Post-Exploitation Framework |
2022-05-06
⋅
CrowdStrike
⋅
macOS Malware Is More Reality Than Myth: Popular Threats and Challenges in Analysis Lador |