Click here to download all references as Bib-File.•
2024-06-21
⋅
Elastic
⋅
GrimResource - Microsoft Management Console for initial access and evasion Cobalt Strike |
2024-05-21
⋅
Elastic
⋅
Invisible miners: unveiling GHOSTENGINE’s crypto mining operations win.ghostengine |
2024-05-16
⋅
Elastic
⋅
Spring Cleaning with LATRODECTUS: A Potential Replacement for ICEDID IcedID Latrodectus |
2024-05-10
⋅
Elastic
⋅
Dissecting REMCOS RAT: An in- depth analysis of a widespread 2024 malware, Part Four Remcos |
2024-05-03
⋅
Elastic
⋅
Dissecting REMCOS RAT: An in- depth analysis of a widespread 2024 malware, Part Three Remcos |
2024-04-30
⋅
Elastic
⋅
Dissecting REMCOS RAT: An in- depth analysis of a widespread 2024 malware, Part Two Remcos |
2024-04-24
⋅
Elastic
⋅
Dissecting REMCOS RAT: An in- depth analysis of a widespread 2024 malware, Part One Remcos |
2024-03-29
⋅
Elastic
⋅
In- the- Wild Windows LPE 0- days: Insights & Detection Strategies |
2023-03-30
⋅
Elastic
⋅
Elastic users protected from SUDDENICON’s supply chain attack 3CX Backdoor |
2022-12-16
⋅
Elastic
⋅
SiestaGraph: New implant uncovered in ASEAN member foreign ministry DoorMe SiestaGraph |
2022-03-07
⋅
Elastic
⋅
PHOREAL Malware Targets the Southeast Asian Financial Sector PHOREAL |
2022-03-01
⋅
Elastic
⋅
Elastic protects against data wiper malware targeting Ukraine: HERMETICWIPER HermeticWiper |
2022-02-07
⋅
Elastic
⋅
Exploring Windows UAC Bypasses: Techniques and Detection Strategies |
2022-01-19
⋅
Elastic
⋅
Operation Bleeding Bear WhisperGate |
2021-12-23
⋅
Elastic
⋅
Elastic Security uncovers BLISTER malware campaign Blister |
2021-03-18
⋅
Elastic
⋅
Hunting for Lateral Movement using Event Query Language |
2020-06-25
⋅
Elastic
⋅
A close look at the advanced techniques used in a Malaysian-focused APT campaign DADSTACHE APT40 |