Click here to download all references as Bib-File.•
| 2022-03-10
⋅
Medium walmartglobaltech
⋅
Diavol the Enigma of Ransomware Diavol |
| 2022-03-09
⋅
Medium Invictus Incident Response
⋅
Set up Splunk for Incident Response in GCP in 15 minutes.. |
| 2022-03-08
⋅
Medium (Cryptax)
⋅
Live reverse engineering of a trojanized medical app — Android/Joker Joker |
| 2022-03-04
⋅
Medium walmartglobaltech
⋅
SystemBC, PowerShell version SystemBC |
| 2022-03-03
⋅
Medium Wes Lambert
⋅
Zero Dollar Detection and Response Orchestration with n8n, Security Onion, TheHive, and Velociraptor |
| 2022-03-03
⋅
Medium s2wlab
⋅
Deep Analysis of Redline Stealer: Leaked Credential with WCF RedLine Stealer |
| 2022-03-01
⋅
Medium whickey000
⋅
How I Cracked CONTI Ransomware Group’s Leaked Source Code ZIP File Conti |
| 2022-02-28
⋅
Medium arnozobec
⋅
Analyzing conti-leaks without speaking russian — only methodology Conti |
| 2022-02-20
⋅
Medium SOCFortress
⋅
Detecting Cobalt Strike Beacons Cobalt Strike |
| 2022-02-17
⋅
Medium s2wlab
⋅
Tracking SugarLocker ransomware & operator Sugar |
| 2022-02-16
⋅
Medium s2wlab
⋅
Post Mortem of KlaySwap Incident through BGP Hijacking | EN |
| 2022-02-16
⋅
Medium elis531989
⋅
Highway to Conti: Analysis of Bazarloader BazarBackdoor |
| 2022-02-14
⋅
Medium walmartglobaltech
⋅
PrivateLoader to Anubis Loader Anubis Loader PrivateLoader |
| 2022-02-04
⋅
Medium tomiwa-xy
⋅
Static analysis of Goldenhelper Malware (Golden Tax malware) GoldenHelper |
| 2022-02-01
⋅
Medium walmartglobaltech
⋅
Sugar Ransomware, a new RaaS Sugar |
| 2022-01-31
⋅
⋅
Medium Sebdraven
⋅
WhisperKill vs WhiteBlackCrypt: un petit soucis de fichiers… WhiteBlackCrypt |
| 2022-01-30
⋅
Medium System Weakness
⋅
Rig Exploitation Kit Infection — Malware Traffic Analysis |
| 2022-01-27
⋅
Medium jonahacks
⋅
Malware Analysis —Manual Unpacking of Redaman RTM |
| 2022-01-25
⋅
Medium (Cryptax)
⋅
BianLian C&C domain name BianLian Hydra |
| 2022-01-21
⋅
Medium (Cryptax)
⋅
Creating a safe dummy C&C to test Android bots BianLian Hydra |