Click here to download all references as Bib-File.•
2021-05-18
⋅
Elastic
⋅
ProblemChild: Detecting living-off-the-land attacks using the Elastic Stack |
2021-04-20
⋅
Elastic
⋅
How attackers abuse Access Token Manipulation (ATT&CK T1134) |
2021-03-27
⋅
InfoSec Handlers Diary Blog
⋅
Malware Analysis with elastic-agent and Microsoft Sandbox |
2021-03-18
⋅
Elastic
⋅
Hunting for Lateral Movement using Event Query Language |
2021-03-16
⋅
Elastic
⋅
Detecting Cobalt Strike with memory signatures Cobalt Strike |
2021-03-11
⋅
Elastic
⋅
Update - Detection and Response for HAFNIUM Activity |
2021-03-09
⋅
360 netlab
⋅
Threat Alert: z0Miner Is Spreading quickly by Exploiting ElasticSearch and Jenkins Vulnerabilities |
2021-03-04
⋅
Elastic
⋅
Detection and Response for HAFNIUM Activity HAFNIUM |
2020-12-18
⋅
Elastic
⋅
Combining supervised and unsupervised machine learning for DGA detection SUNBURST |
2020-06-30
⋅
Github (elastic)
⋅
Detection Rules by Elastic |
2020-06-25
⋅
Elastic
⋅
A close look at the advanced techniques used in a Malaysian-focused APT campaign DADSTACHE APT40 |
2020-05-25
⋅
Elastic
⋅
The Elastic Guide to Threat Hunting |
2020-02-13
⋅
Elastic
⋅
Playing defense against Gamaredon Group Pteranodon |
2019-12-04
⋅
Elastic
⋅
Ransomware, interrupted: Sodinokibi and the supply chain REvil |
2017-07-18
⋅
Elastic
⋅
Ten process injection techniques: A technical survey of common and trending process injection techniques Almanahe Diztakun Ginwui |
2017-07-18
⋅
Elastic
⋅
Ten process injection techniques: A technical survey of common and trending process injection techniques Cryakl CyberGate Dridex FinFisher RAT Locky |