Click here to download all references as Bib-File.•
| 2021-10-18
⋅
Medium Confiant
⋅
Profiling hackers using the Malvertising Attack Matrix by Confiant |
| 2021-04-24
⋅
Medium lordx64
⋅
Initial analysis of PasswordState supply chain attack backdoor code |
| 2020-12-14
⋅
Twitter (@lordx64)
⋅
Tweet on a one liner to decrypt SUNBURST backdoor SUNBURST |
| 2020-07-14
⋅
Confiant
⋅
Internet Explorer CVE-2019–1367 Exploitation — part 3 |
| 2020-07-13
⋅
Confiant
⋅
Internet Explorer CVE-2019–1367 Exploitation — part 1 |
| 2020-07-13
⋅
Confiant
⋅
Internet Explorer CVE-2019–1367 In the wild Exploitation - prelude |
| 2019-12-10
⋅
Confiant
⋅
New macOS Bundlore Loader Analysis Bundlore |
| 2019-04-08
⋅
SANS Cyber Security Summit
⋅
Trails of WindShift WindTail ZhMimikatz |
| 2016-04-13
⋅
FireEye
⋅
Ghosts in the Endpoint PLEAD |
| 2015-12-11
⋅
FireEye
⋅
LATENTBOT: Trace Me If You Can LatentBot |