Click here to download all references as Bib-File.

Enter keywords to filter the library entries below or Propose new Entry
2022-12-07GoogleClement Lecigne, Benoit Sevens
@online{lecigne:20221207:internet:c6ec713, author = {Clement Lecigne and Benoit Sevens}, title = {{Internet Explorer 0-day exploited by North Korean actor APT37}}, date = {2022-12-07}, organization = {Google}, url = {https://blog.google/threat-analysis-group/internet-explorer-0-day-exploited-by-north-korean-actor-apt37/}, language = {English}, urldate = {2022-12-08} } Internet Explorer 0-day exploited by North Korean actor APT37
2022-06-23GoogleBenoit Sevens, Clement Lecigne, Google Threat Analysis Group
@online{sevens:20220623:spyware:e4fb7dd, author = {Benoit Sevens and Clement Lecigne and Google Threat Analysis Group}, title = {{Spyware vendor targets users in Italy and Kazakhstan}}, date = {2022-06-23}, organization = {Google}, url = {https://blog.google/threat-analysis-group/italian-spyware-vendor-targets-users-in-italy-and-kazakhstan/}, language = {English}, urldate = {2022-07-01} } Spyware vendor targets users in Italy and Kazakhstan
Hermit
2022-05-19GoogleClement Lecigne, Christian Resell, Google Threat Analysis Group
@online{lecigne:20220519:protecting:847f98a, author = {Clement Lecigne and Christian Resell and Google Threat Analysis Group}, title = {{Protecting Android users from 0-Day attacks}}, date = {2022-05-19}, organization = {Google}, url = {https://blog.google/threat-analysis-group/protecting-android-users-from-0-day-attacks/}, language = {English}, urldate = {2022-05-25} } Protecting Android users from 0-Day attacks
2021-07-14GoogleMaddie Stone, Clement Lecigne, Google Threat Analysis Group
@online{stone:20210714:how:38dfdc6, author = {Maddie Stone and Clement Lecigne and Google Threat Analysis Group}, title = {{How We Protect Users From 0-Day Attacks (CVE-2021-21166, CVE-2021-30551, CVE-2021-33742, CVE-2021-1879)}}, date = {2021-07-14}, organization = {Google}, url = {https://blog.google/threat-analysis-group/how-we-protect-users-0-day-attacks/}, language = {English}, urldate = {2021-07-26} } How We Protect Users From 0-Day Attacks (CVE-2021-21166, CVE-2021-30551, CVE-2021-33742, CVE-2021-1879)
Cobalt Strike
2020-06-05GoogleClement Lecigne, Google Threat Analysis Group
@online{lecigne:20200605:exploits:37a164b, author = {Clement Lecigne and Google Threat Analysis Group}, title = {{Exploits of a TAG analyst chasing in the wild (video)}}, date = {2020-06-05}, organization = {Google}, url = {https://static.sstic.org/videos2020/1080p/cloture_2020.mp4}, language = {French}, urldate = {2022-05-23} } Exploits of a TAG analyst chasing in the wild (video)
2020-06-05GoogleClement Lecigne, Google Threat Analysis Group
@techreport{lecigne:20200605:exploits:f7ed07e, author = {Clement Lecigne and Google Threat Analysis Group}, title = {{Exploits of a TAG analyst chasing in the wild (slides)}}, date = {2020-06-05}, institution = {Google}, url = {https://www.sstic.org/media/SSTIC2020/SSTIC-actes/cloture_2020/SSTIC2020-Slides-cloture_2020-lecigne.pdf}, language = {English}, urldate = {2022-05-23} } Exploits of a TAG analyst chasing in the wild (slides)