Click here to download all references as Bib-File.•
2022-03-11
⋅
Malware Posing as Russia DDoS Tool Bites Ukraine Hackers |
2021-09-01
⋅
YouTube (Black Hat)
⋅
Threat Hunting in Active Directory Environment |
2021-09-01
⋅
YouTube (Black Hat)
⋅
Domain Borrowing: Catch My C2 Traffic if You Can |
2021-09-01
⋅
YouTube (Black Hat)
⋅
Mem2Img: Memory-Resident Malware Detection via Convolution Neural Network Cobalt Strike PlugX Waterbear |
2021-09-01
⋅
YouTube (Black Hat)
⋅
How Did the Adversaries Abusing the Bitcoin Blockchain Evade Our Takeover? Cerber Pony |
2021-08-20
⋅
YouTube (Black Hat)
⋅
The Kitten that Charmed Me: The 9 Lives of a Nation State Attacker LittleLooter |
2021-05-06
⋅
Black Hat
⋅
Threat Hunting in Active Directory Environment |
2021-05-06
⋅
Black Hat
⋅
How Did the Adversaries Abusing Bitcoin Blockchain Evade Our Takeover Cerber Pony |
2021-02-26
⋅
YouTube (Black Hat)
⋅
FASTCash and INJX_Pure: How Threat Actors Use Public Standards for Financial Fraud FastCash |
2017-08-22
⋅
ESET Research
⋅
Gamescom 2017: It’s all fun and games until black hats step in Joao |
2016-08-01
⋅
Black Hat
⋅
Iran and the Soft Warfor Internet Dominance Infy Sima |
2015-08-05
⋅
Black Hat
⋅
Gameover Zeus – Bad Guys and Backends Gameover P2P |