Click here to download all references as Bib-File.
2020-12-10 ⋅ Palo Alto Networks Unit 42 ⋅ Threat Brief: FireEye Red Team Tool Breach Cobalt Strike |
2020-12-10 ⋅ PICUS Security ⋅ Tactics, Techniques and Procedures (TTPs) Utilized by FireEye’s Red Team Tools |
2020-12-09 ⋅ Github (fireeye) ⋅ Fireeye RED TEAM tool countermeasures |
2020-12-09 ⋅ FireEye ⋅ It's not FINished The Evolving Maturity in Ransomware Operations (SLIDES) Cobalt Strike DoppelPaymer QakBot REvil |
2020-12-08 ⋅ FireEye ⋅ Unauthorized Access of FireEye Red Team Tools |
2020-12-08 ⋅ FireEye ⋅ FireEye Shares Details of Recent Cyber Attack, Actions to Protect Community |
2020-12-01 ⋅ FireEye ⋅ Using Speakeasy Emulation Framework Programmatically to Unpack Malware |
2020-12 ⋅ FireEye ⋅ Solarwinds Breach Resource Center SUNBURST |
2020-11-30 ⋅ FireEye ⋅ It's not FINished The Evolving Maturity in Ransomware Operations Cobalt Strike DoppelPaymer MimiKatz QakBot REvil |
2020-11-22 ⋅ FireEye ⋅ Election Cyber Threats in the Asia-Pacific Region |
2020-11-19 ⋅ FireEye ⋅ Purgalicious VBA: Macro Obfuscation With VBA Purging |
2020-11-12 ⋅ BrightTALK (FireEye) ⋅ Living Off The Land on a Private Island: An Overview of UNC1945 |
2020-11-09 ⋅ FireEye ⋅ WOW64!Hooks: WOW64 Subsystem Internals and Hooking Techniques |
2020-11-04 ⋅ FireEye ⋅ In Wild Critical Buffer Overflow Vulnerability in Solaris Can Allow Remote Takeover — CVE-2020-14871 |
2020-11-02 ⋅ FireEye ⋅ Live off the Land? How About Bringing Your Own Island? An Overview of UNC1945 SLAPSTICK STEELCORGI |
2020-10-28 ⋅ FireEye ⋅ Unhappy Hour Special: KEGTAP and SINGLEMALT With a Ransomware Chaser BazarBackdoor Cobalt Strike Ryuk UNC1878 |
2020-10-14 ⋅ FireEye ⋅ FIN11: Widespread Email Campaigns as Precursor for Ransomware and Data Theft FIN11 |
2020-08-11 ⋅ FireEye ⋅ COOKIEJAR: Tracking Adversaries With FireEye Endpoint Security’s Logon Tracker Module |
2020-08-06 ⋅ FireEye ⋅ Bypassing MassLogger Anti-Analysis — a Man-in-the-Middle Approach MASS Logger |
2020-07-30 ⋅ FireEye ⋅ Obscured by Clouds: Insights into Office 365 Attacks and How Mandiant Managed Defense Investigates |