Click here to download all references as Bib-File.•
2022-04-05
⋅
Medium jsecurity101
⋅
Bypassing Access Mask Auditing Strategies |
2022-04-04
⋅
Medium (csg-govtech)
⋅
Uncommon office malware stagers |
2022-04-01
⋅
Medium s2wlab
⋅
Rising Stealer in Q1 2022: BlackGuard Stealer BlackGuard |
2022-03-31
⋅
Medium michaelkoczwara
⋅
LAPSUS$ TTP’s |
2022-03-28
⋅
Medium walmartglobaltech
⋅
CobaltStrike UUID stager Cobalt Strike |
2022-03-27
⋅
Medium M3H51N
⋅
Malware Analysis — NanoCore Rat Nanocore RAT |
2022-03-24
⋅
⋅
Medium s2wlab
⋅
Footsteps of the LAPSUS$ hacking group |
2022-03-10
⋅
Medium walmartglobaltech
⋅
Diavol the Enigma of Ransomware Diavol |
2022-03-09
⋅
Medium Invictus Incident Response
⋅
Set up Splunk for Incident Response in GCP in 15 minutes.. |
2022-03-08
⋅
Medium (Cryptax)
⋅
Live reverse engineering of a trojanized medical app — Android/Joker Joker |
2022-03-04
⋅
Medium walmartglobaltech
⋅
SystemBC, PowerShell version SystemBC |
2022-03-03
⋅
Medium Wes Lambert
⋅
Zero Dollar Detection and Response Orchestration with n8n, Security Onion, TheHive, and Velociraptor |
2022-03-03
⋅
Medium s2wlab
⋅
Deep Analysis of Redline Stealer: Leaked Credential with WCF RedLine Stealer |
2022-03-01
⋅
Medium whickey000
⋅
How I Cracked CONTI Ransomware Group’s Leaked Source Code ZIP File Conti |
2022-02-28
⋅
Medium arnozobec
⋅
Analyzing conti-leaks without speaking russian — only methodology Conti |
2022-02-20
⋅
Medium SOCFortress
⋅
Detecting Cobalt Strike Beacons Cobalt Strike |
2022-02-17
⋅
Medium s2wlab
⋅
Tracking SugarLocker ransomware & operator Sugar |
2022-02-16
⋅
Medium s2wlab
⋅
Post Mortem of KlaySwap Incident through BGP Hijacking | EN |
2022-02-16
⋅
Medium elis531989
⋅
Highway to Conti: Analysis of Bazarloader BazarBackdoor |
2022-02-14
⋅
Medium walmartglobaltech
⋅
PrivateLoader to Anubis Loader Anubis Loader PrivateLoader |