Click here to download all references as Bib-File.•
2021-02-09
⋅
Medium (@alex.birsan)
⋅
Dependency Confusion: How I Hacked Into Apple, Microsoft and Dozens of Other Companies |
2021-02-09
⋅
Microsoft
⋅
3 Ways to Mitigate Risk When Using Private Package Feeds |
2021-02-09
⋅
Cobalt Strike
⋅
Learn Pipe Fitting for all of your Offense Projects Cobalt Strike |
2021-02-09
⋅
Microsoft
⋅
Windows Win32k Elevation of Privilege Vulnerability CVE-2021-1732 (exploited ITW) |
2021-02-09
⋅
Microsoft
⋅
Multiple Security Updates Affecting TCP/IP: CVE-2021-24074, CVE-2021-24094, and CVE-2021-24086 |
2021-02-09
⋅
Adobe
⋅
Adobe Security Bulletin for 0-day CVE-2021-21017 (exploited ITW) |
2021-02-09
⋅
Trend Micro
⋅
Threat actors now target Docker via container escape features |
2021-02-09
⋅
Securehat
⋅
Extracting the Cobalt Strike Config from a TEARDROP Loader Cobalt Strike TEARDROP |
2021-02-09
⋅
Talos
⋅
Kasablanka Group's LodaRAT improves espionage capabilities on Android and Windows Loda |
2021-02-09
⋅
Max Kersten's Blog
⋅
Ghidra script to decrypt strings in Amadey 1.09 Amadey |
2021-02-09
⋅
Cofense
⋅
BazarBackdoor’s Stealthy Infiltration Evades Multiple SEGs BazarBackdoor |
2021-02-08
⋅
Myanmar Computer Emergency Response Team
⋅
PlugX Removal Guide Version 1.2 PlugX |
2021-02-08
⋅
Arsenal Consulting
⋅
National Investigation Agency VS Sudhir Pralhad Dhawale & others Report 1 NetWire RC |
2021-02-08
⋅
Dragos
⋅
Recommendations Following the Oldsmar Water Treatment Facility Cyber Attack |
2021-02-08
⋅
Lawfare Blog
⋅
What Is the Point of These Nation-State Indictments? Gameover P2P Nymaim |
2021-02-08
⋅
Wired
⋅
A Hacker Tried to Poison a Florida City's Water Supply, Officials Say |
2021-02-08
⋅
Morphisec
⋅
Long Live, Osiris; Banking Trojan Targets German IP Addresses Kronos |
2021-02-08
⋅
CrowdStrike
⋅
Blocking SolarMarker Backdoor solarmarker |
2021-02-08
⋅
Medium kurtikleiton
⋅
Evade EDR with Shellcode Injection and gain persistence using Registry Run Keys |
2021-02-08
⋅
⋅
heise online
⋅
Auf Tätersuche: Herausforderungen bei der Analyse von Cyber-Angriffen |