Click here to download all references as Bib-File.•
2021-10-18
⋅
Medium Confiant
⋅
Profiling hackers using the Malvertising Attack Matrix by Confiant |
2021-04-24
⋅
Medium lordx64
⋅
Initial analysis of PasswordState supply chain attack backdoor code |
2020-12-14
⋅
Twitter (@lordx64)
⋅
Tweet on a one liner to decrypt SUNBURST backdoor SUNBURST |
2020-07-14
⋅
Confiant
⋅
Internet Explorer CVE-2019–1367 Exploitation — part 3 |
2020-07-13
⋅
Confiant
⋅
Internet Explorer CVE-2019–1367 Exploitation — part 1 |
2020-07-13
⋅
Confiant
⋅
Internet Explorer CVE-2019–1367 In the wild Exploitation - prelude |
2019-12-10
⋅
Confiant
⋅
New macOS Bundlore Loader Analysis Bundlore |
2019-04-08
⋅
SANS Cyber Security Summit
⋅
Trails of WindShift WindTail ZhMimikatz |
2016-04-13
⋅
FireEye
⋅
Ghosts in the Endpoint PLEAD |
2015-12-11
⋅
FireEye
⋅
LATENTBOT: Trace Me If You Can LatentBot |