Click here to download all references as Bib-File.•
2020-12-10
⋅
Palo Alto Networks Unit 42
⋅
Threat Brief: FireEye Red Team Tool Breach Cobalt Strike |
2020-12-10
⋅
PICUS Security
⋅
Tactics, Techniques and Procedures (TTPs) Utilized by FireEye’s Red Team Tools |
2020-12-09
⋅
FireEye
⋅
It's not FINished The Evolving Maturity in Ransomware Operations (SLIDES) Cobalt Strike DoppelPaymer QakBot REvil |
2020-12-09
⋅
Github (fireeye)
⋅
Fireeye RED TEAM tool countermeasures |
2020-12-08
⋅
FireEye
⋅
Unauthorized Access of FireEye Red Team Tools |
2020-12-08
⋅
FireEye
⋅
FireEye Shares Details of Recent Cyber Attack, Actions to Protect Community |
2020-12-01
⋅
FireEye
⋅
Solarwinds Breach Resource Center SUNBURST |
2020-12-01
⋅
FireEye
⋅
Using Speakeasy Emulation Framework Programmatically to Unpack Malware |
2020-11-30
⋅
FireEye
⋅
It's not FINished The Evolving Maturity in Ransomware Operations Cobalt Strike DoppelPaymer MimiKatz QakBot REvil |
2020-11-22
⋅
FireEye
⋅
Election Cyber Threats in the Asia-Pacific Region |
2020-11-19
⋅
FireEye
⋅
Purgalicious VBA: Macro Obfuscation With VBA Purging |
2020-11-12
⋅
BrightTALK (FireEye)
⋅
Living Off The Land on a Private Island: An Overview of UNC1945 |
2020-11-09
⋅
FireEye
⋅
WOW64!Hooks: WOW64 Subsystem Internals and Hooking Techniques |
2020-11-04
⋅
FireEye
⋅
In Wild Critical Buffer Overflow Vulnerability in Solaris Can Allow Remote Takeover — CVE-2020-14871 |
2020-11-02
⋅
FireEye
⋅
Live off the Land? How About Bringing Your Own Island? An Overview of UNC1945 SLAPSTICK STEELCORGI |
2020-10-28
⋅
FireEye
⋅
Unhappy Hour Special: KEGTAP and SINGLEMALT With a Ransomware Chaser BazarBackdoor Cobalt Strike Ryuk UNC1878 |
2020-10-14
⋅
FireEye
⋅
FIN11: Widespread Email Campaigns as Precursor for Ransomware and Data Theft FIN11 |
2020-08-11
⋅
FireEye
⋅
COOKIEJAR: Tracking Adversaries With FireEye Endpoint Security’s Logon Tracker Module |
2020-08-06
⋅
FireEye
⋅
Bypassing MassLogger Anti-Analysis — a Man-in-the-Middle Approach MASS Logger |
2020-07-30
⋅
FireEye
⋅
Obscured by Clouds: Insights into Office 365 Attacks and How Mandiant Managed Defense Investigates |