Click here to download all references as Bib-File.

Enter keywords to filter the library entries below or Propose new Entry
2021-11-04Youtube (Virus Bulletin)Joey Chen, Yi-Jhen Hsieh
ShadowPad: the masterpiece of privately sold malware in Chinese espionage
PlugX ShadowPad
2021-11-04Youtube (Virus Bulletin)Joey Chen, Yi-Jhen Hsieh
ShadowPad: the masterpiece of privately sold malware in Chinese espionage
PlugX ShadowPad
2021-10-30YouTube ( DuMp-GuY TrIcKsTeR)Jiří Vinopal
Reversing CryptoCrazy Ransomware - PoC Decryptor and some Tricks
Povlsomware
2021-10-21Bleeping ComputerLawrence Abrams
Massive campaign uses YouTube to push password-stealing malware
Raccoon RedLine Stealer
2021-10-20GoogleAshley Shen, Google Threat Analysis Group
Phishing campaign targets YouTube creators with cookie theft malware
2021-10-20GoogleAshley Shen, Google Threat Analysis Group
Phishing campaign targets YouTube creators with cookie theft malware
2021-10-14YouTube (Uriel Kosayev)Uriel Kosayev
DarkSide Ransomware Reverse Engineering
BlackMatter DarkSide BlackMatter DarkSide
2021-09-27Youtube (OALabs)Sergei Frankoff
Live Coding A Squirrelwaffle Malware Config Extractor
Squirrelwaffle
2021-09-22YouTube (John Hammond)John Hammond
Snip3 Crypter/RAT Loader - DcRat MALWARE ANALYSIS
DCRat
2021-09-01YouTube (Hack In The Box Security Conference)Joey Chen, Yi-Jhen Hsieh
SHADOWPAD: Chinese Espionage Malware-as-a-Service
PlugX ShadowPad
2021-09-01YouTube (Hack In The Box Security Conference)Joey Chen, Yi-Jhen Hsieh
SHADOWPAD: Chinese Espionage Malware-as-a-Service
PlugX ShadowPad
2021-09-01YouTube (Black Hat)Anurag Khanna, Thirumalai Natarajan Muthiah
Threat Hunting in Active Directory Environment
2021-09-01YouTube (Black Hat)Anurag Khanna, Thirumalai Natarajan Muthiah
Threat Hunting in Active Directory Environment
2021-09-01YouTube (Black Hat)Junyu Zhou, Tianze Ding
Domain Borrowing: Catch My C2 Traffic if You Can
2021-09-01YouTube (Black Hat)Junyu Zhou, Tianze Ding
Domain Borrowing: Catch My C2 Traffic if You Can
2021-09-01YouTube (Black Hat)Aragorn Tseng, Charles Li
Mem2Img: Memory-Resident Malware Detection via Convolution Neural Network
Cobalt Strike PlugX Waterbear
2021-09-01YouTube (Black Hat)Aragorn Tseng, Charles Li
Mem2Img: Memory-Resident Malware Detection via Convolution Neural Network
Cobalt Strike PlugX Waterbear
2021-09-01YouTube (Black Hat)Christian Doerr, Tsuyoshi Taniguchi
How Did the Adversaries Abusing the Bitcoin Blockchain Evade Our Takeover?
Cerber Pony
2021-09-01YouTube (Black Hat)Christian Doerr, Tsuyoshi Taniguchi
How Did the Adversaries Abusing the Bitcoin Blockchain Evade Our Takeover?
Cerber Pony
2021-08-28YouTube (Kevin Bock)Kevin Bock
Even Censors Have a Backup: Examining China’s Double HTTPS Censorship Middleboxes - FOCI 21