Click here to download all references as Bib-File.

Enter keywords to filter the library entries below or Propose new Entry
2024-04-17MicrosoftHagai Ran Kestenberg, Yossi Weizman
Attackers exploiting new critical OpenMetadata vulnerabilities on Kubernetes clusters
2024-04-17MicrosoftHagai Ran Kestenberg, Yossi Weizman
Attackers exploiting new critical OpenMetadata vulnerabilities on Kubernetes clusters
2023-12-28Russian Panda Research BlogRussianPanda
MetaStealer Part 2, Google Cookie Refresher Madness and Stealer Drama
MetaStealer
2023-12-08Medium g0njxag0njxa
Approaching stealers devs : a brief interview with Meta
MetaStealer
2023-11-20Russian Panda Research BlogRussianPanda
MetaStealer - Redline's Doppelgänger
MetaStealer RedLine Stealer
2023-05-12YouTube (BSides Prishtina)Egxona Ferati, META
Automating Threat Detection and Response at Scale - Egxona Ferati
2023-05-09Medium walmartglobaltechJason Reaves, Jonathan Mccay, Joshua Platt
MetaStealer string decryption and DGA overview
MetaStealer
2023-05-09Medium walmartglobaltechJason Reaves, Jonathan Mccay, Joshua Platt
MetaStealer string decryption and DGA overview
MetaStealer
2023-05-09Medium walmartglobaltechJason Reaves, Jonathan Mccay, Joshua Platt
MetaStealer string decryption and DGA overview
MetaStealer
2023-05-03METABen Nimmo, Nathaniel Gleicher
Meta’s Adversarial Threat Report, First Quarter 2023
2023-05-03METABen Nimmo, Nathaniel Gleicher
Meta’s Adversarial Threat Report, First Quarter 2023
2023-01-19CiscoGuilherme Venere
Following the LNK metadata trail
BumbleBee PhotoLoader QakBot
2023-01-13Metabase QDiana Tadeo, Leonardo Beltran
Grandoreiro banking malware: deciphering the DGA
Grandoreiro
2023-01-13Metabase QDiana Tadeo, Leonardo Beltran
Grandoreiro banking malware: deciphering the DGA
Grandoreiro
2022-12-01SentinelOneAleksandar Milenkoski
The Mystery of Metador | Unpicking Mafalda’s Anti-Analysis Techniques
Metador
2022-09-22SentinelOneAleksandar Milenkoski, Amitai Ben Shushan Ehrlich, Juan Andrés Guerrero-Saade
The Mystery of Metador | An Unattributed Threat Hiding in Telcos, ISPs, and Universities
Metador
2022-09-22SentinelOneAleksandar Milenkoski, Amitai Ben Shushan Ehrlich, Juan Andrés Guerrero-Saade
The Mystery of Metador | An Unattributed Threat Hiding in Telcos, ISPs, and Universities
Metador
2022-09-22SentinelOneAleksandar Milenkoski, Amitai Ben Shushan Ehrlich, Juan Andrés Guerrero-Saade
The Mystery of Metador | An Unattributed Threat Hiding in Telcos, ISPs, and Universities
Metador
2022-09-22SentinelOneAleksandar Milenkoski, Amitai Ben, Juan Andrés Guerrero-Saade, Shushan Ehrlich
The Mystery of Metador | An Unattributed Threat Hiding in Telcos, ISPs, and Universities
2022-09-22SentinelOneAleksandar Milenkoski, Amitai Ben, Juan Andrés Guerrero-Saade, Shushan Ehrlich
The Mystery of Metador | An Unattributed Threat Hiding in Telcos, ISPs, and Universities