Click here to download all references as Bib-File.
2021-10-18 ⋅ Medium Confiant ⋅ Profiling hackers using the Malvertising Attack Matrix by Confiant |
2021-04-24 ⋅ Medium lordx64 ⋅ Initial analysis of PasswordState supply chain attack backdoor code |
2020-12-14 ⋅ Twitter (@lordx64) ⋅ Tweet on a one liner to decrypt SUNBURST backdoor SUNBURST |
2020-07-14 ⋅ Confiant ⋅ Internet Explorer CVE-2019–1367 Exploitation — part 3 |
2020-07-13 ⋅ Confiant ⋅ Internet Explorer CVE-2019–1367 In the wild Exploitation - prelude |
2020-07-13 ⋅ Confiant ⋅ Internet Explorer CVE-2019–1367 Exploitation — part 1 |
2019-12-10 ⋅ Confiant ⋅ New macOS Bundlore Loader Analysis Bundlore |
2019-04-08 ⋅ SANS Cyber Security Summit ⋅ Trails of WindShift WindTail ZhMimikatz |
2016-04-13 ⋅ FireEye ⋅ Ghosts in the Endpoint PLEAD |
2015-12-11 ⋅ FireEye ⋅ LATENTBOT: Trace Me If You Can LatentBot |