Click here to download all references as Bib-File.
|2020-11-30 ⋅ Microsoft ⋅ |
Threat actor (BISMUTH) leverages coin miner techniques to stay under the radar – here’s how to spot them
|2020-09-10 ⋅ Microsoft ⋅ |
STRONTIUM: Detecting new patterns in credential harvesting
|2019-12-12 ⋅ Microsoft ⋅ |
GALLIUM: Targeting global telecom
CHINACHOPPER Ghost RAT HTran MimiKatz Poison Ivy GALLIUM