Click here to download all references as Bib-File.

Enter keywords to filter the library entries below or Propose new Entry
2023-04-16YouTube (botconf eu)Crowdstrike Technical Analysis Cell (TAC), Suweera De Souza
Tracking Bumblebee’s Development
BumbleBee
2023-04-16YouTube (botconf eu)Crowdstrike Technical Analysis Cell (TAC), Suweera De Souza
Tracking Bumblebee’s Development
BumbleBee
2023-04-13YouTube (The Korea Society)Jean Lee, Mandiant, Michael Barnhart
The North Korean Cyber Threat
2023-04-13YouTube (The Korea Society)Jean Lee, Mandiant, Michael Barnhart
The North Korean Cyber Threat
2023-04-13YouTube (The Korea Society)Jean Lee, Mandiant, Michael Barnhart
The North Korean Cyber Threat
2023-04-03Youtube (MalwareAnalysisForHedgehogs)Karsten Hahn
Malware Analysis - 3CX SmoothOperator ffmpeg.dll with Binary Ninja
3CX Backdoor
2023-03-31Youtube (ThreatCatch)ThreatCat.ch
Sinkholing the Domain Generation Algorithm of m0yv
Expiro m0yv
2023-03-20Medium s2wlabHOTSAUCE, S2W TALON
Detailed Analysis of Cryptocurrency Phishing Through Famous YouTube Channel Hacking
2023-03-20Medium s2wlabHOTSAUCE, S2W TALON
Detailed Analysis of Cryptocurrency Phishing Through Famous YouTube Channel Hacking
2023-03-02Youtube (Microsoft Security Response Center (MSRC))Ben Magee, Daniel Taylor
BlueHat 2023: Hunting Qakbot with Daniel Taylor & Ben Magee
QakBot
2023-03-02Youtube (Microsoft Security Response Center (MSRC))Ben Magee, Daniel Taylor
BlueHat 2023: Hunting Qakbot with Daniel Taylor & Ben Magee
QakBot
2023-03-02YouTube (Microsoft Security)Laurie Kirk
BlueHat 2023 Lightning Talk: Android Malware Obfuscation
2023-02-27Medium s2wlabJiho Kim, Lee Sebin
Lumma Stealer targets YouTubers via Spear-phishing Email
Lumma Stealer
2023-02-27Medium s2wlabJiho Kim, Lee Sebin
Lumma Stealer targets YouTubers via Spear-phishing Email
Lumma Stealer
2023-02-12Youtube (OALabs)Fabian Wosar, Sergei Frankoff
ESXiArgs Ransomware Analysis with @fwosar
ESXiArgs
2023-02-12Youtube (OALabs)Fabian Wosar, Sergei Frankoff
ESXiArgs Ransomware Analysis with @fwosar
ESXiArgs
2023-02-06Youtube (Motasem Hamdan)Motasem Hamdan
Malware Analysis Basics: Dissecting PE (Portable Executable) Headers | TryHackMe
2023-02-04Youtube (Dr Josh Stroschein)Josh Stroschein
Investigating NullMixer Network Traffic: Utilizing Suricata and Evebox (Part 3)
Nullmixer
2023-02-03Youtube (Dr Josh Stroschein)Josh Stroschein
Unpacking NullMixer - Identifying and Unraveling ASPack (Part 2)
Nullmixer
2023-02-02YouTube (Embee Research)Embee_research
Xworm Loader Analysis - Decoding Malware Scripts and Extracting C2's with DnSpy and CyberChef
XWorm