Click here to download all references as Bib-File.
2021-09-01 ⋅ YouTube (Black Hat) ⋅ Domain Borrowing: Catch My C2 Traffic if You Can |
2021-09-01 ⋅ YouTube (Black Hat) ⋅ Threat Hunting in Active Directory Environment |
2021-09-01 ⋅ YouTube (Black Hat) ⋅ How Did the Adversaries Abusing the Bitcoin Blockchain Evade Our Takeover? Cerber Pony |
2021-09-01 ⋅ YouTube (Black Hat) ⋅ Mem2Img: Memory-Resident Malware Detection via Convolution Neural Network Cobalt Strike PlugX Waterbear |
2021-08-20 ⋅ YouTube (Black Hat) ⋅ The Kitten that Charmed Me: The 9 Lives of a Nation State Attacker LittleLooter |
2021-02-26 ⋅ YouTube (Black Hat) ⋅ FASTCash and INJX_Pure: How Threat Actors Use Public Standards for Financial Fraud FastCash |