Click here to download all references as Bib-File.•
2024-02-05
⋅
YouTube (John Hammond)
⋅
PikaBot Malware Analysis: Debugging in Visual Studio Pikabot |
2023-03-30
⋅
Huntress Labs
⋅
3CX VoIP Software Compromise & Supply Chain Threats 3CX Backdoor |
2022-10-04
⋅
YouTube (John Hammond)
⋅
HAVOC C2 - Demon Bypasses Windows 11 Defender Havoc |
2022-03-01
⋅
Huntress Labs
⋅
Targeted APT Activity: BABYSHARK Is Out for Blood BabyShark |
2022-02-18
⋅
YouTube (John Hammond)
⋅
Uncovering NETWIRE Malware - Discovery & Deobfuscation NetWire RC |
2021-09-22
⋅
YouTube (John Hammond)
⋅
Snip3 Crypter/RAT Loader - DcRat MALWARE ANALYSIS DCRat |
2021-08-19
⋅
Huntress Labs
⋅
Microsoft Exchange Servers Still Vulnerable to ProxyShell Exploit |
2021-07-27
⋅
Youtube (SANS Institute)
⋅
SANS Threat Analysis Rundown - Kaseya VSA attack REvil |
2021-07-20
⋅
Huntress Labs
⋅
Security Researchers’ Hunt to Discover Origins of the Kaseya VSA Mass Ransomware Incident REvil |
2021-07-13
⋅
YouTube (John Hammond)
⋅
JScript Deobfuscation - More WSHRAT (Malware Analysis) Houdini |
2021-04-05
⋅
Huntress Labs
⋅
From PowerShell to Payload: An Analysis of Weaponized Malware |
2021-03-09
⋅
YouTube (John Hammond)
⋅
HAFNIUM - Post-Exploitation Analysis from Microsoft Exchange CHINACHOPPER |
2021-03-03
⋅
Huntress Labs
⋅
Rapid Response: Mass Exploitation of On-Prem Exchange Servers CHINACHOPPER HAFNIUM |
2021-03-01
⋅
YouTube (John Hammond)
⋅
Mozi Malware - Finding Breadcrumbs... Mozi |
2021-01-28
⋅
Huntress Labs
⋅
Analyzing Ryuk Another Link in the Cyber Attack Chain BazarBackdoor Ryuk |