Click here to download all references as Bib-File.

Enter keywords to filter the library entries below or Propose new Entry
2021-09-01YouTube (Black Hat)Anurag Khanna, Thirumalai Natarajan Muthiah
Threat Hunting in Active Directory Environment
2021-09-01YouTube (Black Hat)Anurag Khanna, Thirumalai Natarajan Muthiah
Threat Hunting in Active Directory Environment
2021-09-01YouTube (Black Hat)Junyu Zhou, Tianze Ding
Domain Borrowing: Catch My C2 Traffic if You Can
2021-09-01YouTube (Black Hat)Junyu Zhou, Tianze Ding
Domain Borrowing: Catch My C2 Traffic if You Can
2021-09-01YouTube (Black Hat)Aragorn Tseng, Charles Li
Mem2Img: Memory-Resident Malware Detection via Convolution Neural Network
Cobalt Strike PlugX Waterbear
2021-09-01YouTube (Black Hat)Aragorn Tseng, Charles Li
Mem2Img: Memory-Resident Malware Detection via Convolution Neural Network
Cobalt Strike PlugX Waterbear
2021-09-01YouTube (Black Hat)Christian Doerr, Tsuyoshi Taniguchi
How Did the Adversaries Abusing the Bitcoin Blockchain Evade Our Takeover?
Cerber Pony
2021-09-01YouTube (Black Hat)Christian Doerr, Tsuyoshi Taniguchi
How Did the Adversaries Abusing the Bitcoin Blockchain Evade Our Takeover?
Cerber Pony
2021-08-20YouTube (Black Hat)Allison Wikoff, Richard Emerson
The Kitten that Charmed Me: The 9 Lives of a Nation State Attacker
LittleLooter
2021-08-20YouTube (Black Hat)Allison Wikoff, Richard Emerson
The Kitten that Charmed Me: The 9 Lives of a Nation State Attacker
LittleLooter
2021-02-26YouTube (Black Hat)Kevin Perlow
FASTCash and INJX_Pure: How Threat Actors Use Public Standards for Financial Fraud
FastCash