Click here to download all references as Bib-File.•
| 2025-04-15
            
            ⋅
            
            sysdig
            ⋅ UNC5174’s evolution in China’s ongoing cyber warfare: From SNOWLIGHT to VShell SNOWLIGHT Sliver Vshell | 
| 2024-07-11
            
            ⋅
            
            sysdig
            ⋅ CRYSTALRAY: Inside the Operations of a Rising Threat Actor Exploiting OSS Tools CRYSTALRAY | 
| 2024-04-09
            
            ⋅
            
            sysdig
            ⋅ RUBYCARP: A Detailed Analysis of a Sophisticated Decade-Old Botnet Group PerlBot RUBYCARP | 
| 2023-07-11
            
            ⋅
            
            sysdig
            ⋅ SCARLETEEL 2.0: Fargate, Kubernetes, and Crypto SCARLETEEL | 
| 2023-02-28
            
            ⋅
            
            sysdig
            ⋅ SCARLETEEL: Operation leveraging Terraform, Kubernetes, and AWS for data theft SCARLETEEL | 
| 2021-12-07
            
            ⋅
            
            sysdig
            ⋅ Threat news: TeamTNT stealing credentials using EC2 Instance Metadata TeamTNT | 
| 2021-11-16
            
            ⋅
            
            sysdig
            ⋅ Hands-On Muhstik Botnet: crypto-mining attacks targeting Kubernetes Tsunami | 
| 2021-11-02
            
            ⋅
            
            sysdig
            ⋅ Malware analysis: Hands-On Shellbot malware PerlBot | 
| 2020-11-23
            
            ⋅
            
            sysdig
            ⋅ Zoom into Kinsing Kinsing Kinsing |