Click here to download all references as Bib-File.

Enter keywords to filter the library entries below or Propose new Entry
2022-03-11Black Hat Ethical Hacking
Malware Posing as Russia DDoS Tool Bites Ukraine Hackers
2021-09-01YouTube (Black Hat)Anurag Khanna, Thirumalai Natarajan Muthiah
Threat Hunting in Active Directory Environment
2021-09-01YouTube (Black Hat)Junyu Zhou, Tianze Ding
Domain Borrowing: Catch My C2 Traffic if You Can
2021-09-01YouTube (Black Hat)Aragorn Tseng, Charles Li
Mem2Img: Memory-Resident Malware Detection via Convolution Neural Network
Cobalt Strike PlugX Waterbear
2021-09-01YouTube (Black Hat)Christian Doerr, Tsuyoshi Taniguchi
How Did the Adversaries Abusing the Bitcoin Blockchain Evade Our Takeover?
Cerber Pony
2021-08-20YouTube (Black Hat)Allison Wikoff, Richard Emerson
The Kitten that Charmed Me: The 9 Lives of a Nation State Attacker
LittleLooter
2021-05-06Black HatAnurag Khanna, Thirumalai Natarajan Muthiah
Threat Hunting in Active Directory Environment
2021-05-06Black HatChristian Doerr, Tsuyoshi Taniguchi
How Did the Adversaries Abusing Bitcoin Blockchain Evade Our Takeover
Cerber Pony
2021-02-26YouTube (Black Hat)Kevin Perlow
FASTCash and INJX_Pure: How Threat Actors Use Public Standards for Financial Fraud
FastCash
2017-08-22ESET ResearchTomáš Gardoň
Gamescom 2017: It’s all fun and games until black hats step in
Joao
2016-08-01Black HatClaudio Guarnieri, Collin Anderson
Iran and the Soft Warfor Internet Dominance
Infy Sima
2015-08-05Black HatElliott Peterson, Michael Sandee, Tillmann Werner
Gameover Zeus – Bad Guys and Backends
Gameover P2P