Click here to download all references as Bib-File.•
2022-05-06
⋅
CrowdStrike
⋅
macOS Malware Is More Reality Than Myth: Popular Threats and Challenges in Analysis EvilQuest FlashBack Shlayer XCSSET |
2022-05-04
⋅
CrowdStrike
⋅
Compromised Docker Honeypots Used for Pro-Ukrainian DoS Attack |
2022-04-21
⋅
CrowdStrike
⋅
LemonDuck Targets Docker for Cryptomining Operations Lemon Duck |
2022-04-01
⋅
CrowdStrike
⋅
BERT Embeddings: A Modern Machine-learning Approach for Detecting Malware from Command Lines (Part 2 of 2) |
2022-03-31
⋅
CrowdStrike
⋅
Cloudy with a Chance of Unclear Mailbox Sync: CrowdStrike Services Identifies Logging Inconsistencies in Microsoft 365 |
2022-03-30
⋅
CrowdStrike
⋅
Who is EMBER BEAR? SaintBear |
2022-03-30
⋅
CrowdStrike
⋅
Who is EMBER BEAR? WhisperGate |
2022-03-23
⋅
CrowdStrike
⋅
Falcon OverWatch Threat Hunting Contributes to Seamless Protection Against Novel BlackCat Attack BlackCat |
2022-03-14
⋅
CrowdStrike
⋅
Falcon OverWatch Threat Hunting Uncovers Ongoing NIGHT SPIDER Zloader Campaign Zloader |
2022-03-07
⋅
CrowdStrike
⋅
PROPHET SPIDER Exploits Citrix ShareFile Remote Code Execution Vulnerability CVE-2021-22941 to Deliver Webshell Prophet Spider |
2022-03-02
⋅
Techtarget
⋅
CrowdStrike cracks PartyTicket ransomware targeting Ukraine PartyTicket |
2022-03-01
⋅
CrowdStrike
⋅
Decryptable PartyTicket Ransomware Reportedly Targeting Ukrainian Entities PartyTicket |
2022-02-25
⋅
CrowdStrike
⋅
CrowdStrike Falcon Protects from New Wiper Malware Used in Ukraine Cyberattacks HermeticWiper |
2022-02-23
⋅
CrowdStrike
⋅
Access Brokers: Who Are the Targets, and What Are They Worth? |
2022-02-22
⋅
CrowdStrike
⋅
CrowdStrike Research Investigates Exploit Behavior to Strengthen Customer Protection |
2022-02-16
⋅
CrowdStrike
⋅
Global Threat Report 2022 Sea Turtle |
2022-01-31
⋅
CrowdStrike
⋅
CrowdStrike Falcon Proactively Protects Against Wiper Malware as CISA Warns U.S. Companies of Potential Attacks WhisperGate |
2022-01-28
⋅
CrowdStrike
⋅
Lessons Learned From Successive Use of Offensive Cyber Operations Against Ukraine and What May Be Next WhisperGate |
2022-01-27
⋅
CrowdStrike
⋅
New Docker Cryptojacking Attempts Detected Over 2021 End-of-Year Holidays |
2022-01-27
⋅
CrowdStrike
⋅
Programs Hacking Programs: How to Extract Memory Information to Spot Linux Malware |