Click here to download all references as Bib-File.•
2022-10-31
⋅
Elastic
⋅
ICEDIDs network infrastructure is alive and well IcedID |
2022-10-28
⋅
Elastic
⋅
EMOTET dynamic config extraction Emotet |
2022-09-09
⋅
Elastic
⋅
BUGHATCH Malware Analysis BUGHATCH |
2022-08-24
⋅
Elastic
⋅
QBOT Malware Analysis QakBot |
2022-07-27
⋅
Elastic
⋅
Exploring the QBOT Attack Pattern QakBot |
2022-07-27
⋅
Elastic
⋅
QBOT Configuration Extractor QakBot |
2022-06-01
⋅
Elastic
⋅
CUBA Ransomware Campaign Analysis Cobalt Strike Cuba Meterpreter MimiKatz SystemBC |
2022-06-01
⋅
Elastic
⋅
CUBA Ransomware Malware Analysis Cuba |
2022-05-17
⋅
Elastic
⋅
A peek behind the BPFDoor BPFDoor |
2022-05-05
⋅
Elastic
⋅
BLISTER Loader Blister |
2022-03-07
⋅
Elastic
⋅
PHOREAL Malware Targets the Southeast Asian Financial Sector PHOREAL |
2022-03-01
⋅
Elastic
⋅
Elastic protects against data wiper malware targeting Ukraine: HERMETICWIPER HermeticWiper |
2022-02-07
⋅
Elastic
⋅
Exploring Windows UAC Bypasses: Techniques and Detection Strategies |
2022-02-02
⋅
Elastic
⋅
Sandboxing Antimalware Products for Fun and Profit |
2022-01-19
⋅
Elastic
⋅
Operation Bleeding Bear WhisperGate |
2022-01-19
⋅
Elastic
⋅
Extracting Cobalt Strike Beacon Configurations Cobalt Strike |
2022-01-19
⋅
Elastic
⋅
Collecting Cobalt Strike Beacons with the Elastic Stack Cobalt Strike |
2022-01-19
⋅
Elastic
⋅
Operation Bleeding Bear WhisperGate |
2022-01-18
⋅
Elastic
⋅
FORMBOOK Adopts CAB-less Approach Formbook |
2021-12-23
⋅
Elastic
⋅
Elastic Security uncovers BLISTER malware campaign Blister |