Click here to download all references as Bib-File.

Enter keywords to filter the library entries below or Propose new Entry
2022-03-11Black Hat Ethical Hacking
@online{hacking:20220311:malware:5ba0aa9, author = {Black Hat Ethical Hacking}, title = {{Malware Posing as Russia DDoS Tool Bites Ukraine Hackers}}, date = {2022-03-11}, url = {https://www.blackhatethicalhacking.com/news/malware-posing-as-russia-ddos-tool-bites-ukraine-hackers/}, language = {English}, urldate = {2022-03-14} } Malware Posing as Russia DDoS Tool Bites Ukraine Hackers
2021-09-01YouTube (Black Hat)Tianze Ding, Junyu Zhou
@online{ding:20210901:domain:92aa2f7, author = {Tianze Ding and Junyu Zhou}, title = {{Domain Borrowing: Catch My C2 Traffic if You Can}}, date = {2021-09-01}, organization = {YouTube (Black Hat)}, url = {https://www.youtube.com/watch?v=eVr0kKdgM2I}, language = {English}, urldate = {2021-09-14} } Domain Borrowing: Catch My C2 Traffic if You Can
2021-09-01YouTube (Black Hat)Anurag Khanna, Thirumalai Natarajan Muthiah
@online{khanna:20210901:threat:e4d67de, author = {Anurag Khanna and Thirumalai Natarajan Muthiah}, title = {{Threat Hunting in Active Directory Environment}}, date = {2021-09-01}, organization = {YouTube (Black Hat)}, url = {https://www.youtube.com/watch?v=lBIaLmvVpBE}, language = {English}, urldate = {2021-09-22} } Threat Hunting in Active Directory Environment
2021-09-01YouTube (Black Hat)Tsuyoshi Taniguchi, Christian Doerr
@online{taniguchi:20210901:how:98ed0d5, author = {Tsuyoshi Taniguchi and Christian Doerr}, title = {{How Did the Adversaries Abusing the Bitcoin Blockchain Evade Our Takeover?}}, date = {2021-09-01}, organization = {YouTube (Black Hat)}, url = {https://www.youtube.com/watch?v=y8Z9KnL8s8s}, language = {English}, urldate = {2021-09-12} } How Did the Adversaries Abusing the Bitcoin Blockchain Evade Our Takeover?
Cerber Pony
2021-09-01YouTube (Black Hat)Aragorn Tseng, Charles Li
@online{tseng:20210901:mem2img:7817a5d, author = {Aragorn Tseng and Charles Li}, title = {{Mem2Img: Memory-Resident Malware Detection via Convolution Neural Network}}, date = {2021-09-01}, organization = {YouTube (Black Hat)}, url = {https://www.youtube.com/watch?v=6SDdUVejR2w}, language = {English}, urldate = {2021-09-12} } Mem2Img: Memory-Resident Malware Detection via Convolution Neural Network
Cobalt Strike PlugX Waterbear
2021-08-20YouTube (Black Hat)Allison Wikoff, Richard Emerson
@online{wikoff:20210820:kitten:3234e60, author = {Allison Wikoff and Richard Emerson}, title = {{The Kitten that Charmed Me: The 9 Lives of a Nation State Attacker}}, date = {2021-08-20}, organization = {YouTube (Black Hat)}, url = {https://www.youtube.com/watch?v=nilzxS9rxEM}, language = {English}, urldate = {2021-09-02} } The Kitten that Charmed Me: The 9 Lives of a Nation State Attacker
LittleLooter
2021-05-06Black HatTsuyoshi Taniguchi, Christian Doerr
@techreport{taniguchi:20210506:how:45b144d, author = {Tsuyoshi Taniguchi and Christian Doerr}, title = {{How Did the Adversaries Abusing Bitcoin Blockchain Evade Our Takeover}}, date = {2021-05-06}, institution = {Black Hat}, url = {https://i.blackhat.com/asia-21/Thursday-Handouts/as21-Taniguchi-How-Did-The-Adversaries-Abusing-The-Bitcoin-Blockchain-Evade-Our-Takeover.pdf}, language = {English}, urldate = {2021-09-12} } How Did the Adversaries Abusing Bitcoin Blockchain Evade Our Takeover
Cerber Pony
2021-05-06Black HatAnurag Khanna, Thirumalai Natarajan Muthiah
@techreport{khanna:20210506:threat:61ba9ba, author = {Anurag Khanna and Thirumalai Natarajan Muthiah}, title = {{Threat Hunting in Active Directory Environment}}, date = {2021-05-06}, institution = {Black Hat}, url = {https://i.blackhat.com/asia-21/Thursday-Handouts/as-21-Khanna-Threat-Hunting-In-Active-Directory-Environment.pdf}, language = {English}, urldate = {2021-09-22} } Threat Hunting in Active Directory Environment
2021-02-26YouTube (Black Hat)Kevin Perlow
@online{perlow:20210226:fastcash:2daf61f, author = {Kevin Perlow}, title = {{FASTCash and INJX_Pure: How Threat Actors Use Public Standards for Financial Fraud}}, date = {2021-02-26}, organization = {YouTube (Black Hat)}, url = {https://www.youtube.com/watch?v=zGvQPtejX9w}, language = {English}, urldate = {2021-03-04} } FASTCash and INJX_Pure: How Threat Actors Use Public Standards for Financial Fraud
FastCash
2017-08-22ESET ResearchTomáš Gardoň
@online{gardo:20170822:gamescom:764a8eb, author = {Tomáš Gardoň}, title = {{Gamescom 2017: It’s all fun and games until black hats step in}}, date = {2017-08-22}, organization = {ESET Research}, url = {https://www.welivesecurity.com/2017/08/22/gamescom-2017-fun-blackhats/}, language = {English}, urldate = {2019-11-14} } Gamescom 2017: It’s all fun and games until black hats step in
Joao
2016-08Black HatClaudio Guarnieri, Collin Anderson
@techreport{guarnieri:201608:iran:d15568e, author = {Claudio Guarnieri and Collin Anderson}, title = {{Iran and the Soft Warfor Internet Dominance}}, date = {2016-08}, institution = {Black Hat}, url = {https://www.blackhat.com/docs/us-16/materials/us-16-Guarnieri-Iran-And-The-Soft-War-For-Internet-Dominance-wp.pdf}, language = {English}, urldate = {2019-11-26} } Iran and the Soft Warfor Internet Dominance
Infy Sima
2015-08-05Black HatMichael Sandee, Tillmann Werner, Elliott Peterson
@techreport{sandee:20150805:gameover:fa47096, author = {Michael Sandee and Tillmann Werner and Elliott Peterson}, title = {{Gameover Zeus – Bad Guys and Backends}}, date = {2015-08-05}, institution = {Black Hat}, url = {https://www.blackhat.com/docs/us-15/materials/us-15-Peterson-GameOver-Zeus-Badguys-And-Backends.pdf}, language = {English}, urldate = {2020-01-06} } Gameover Zeus – Bad Guys and Backends
Gameover P2P