Hijacking the Boot Process, Ransomware Style - Raul Alvarez, Fortinet
DefCamp 2017 - Hijacking the Boot Process – Ransomware Style
Hijacking the Boot Process, Ransomware Style Raul Alvarez, Fortinet
ShowMeCon 2018 Track 2 03 Hijacking the Boot Process Ransomware Style Raul Alvarez
Hijacking the Boot Process Ransomware Style DefCamp 2017
SEC-T 0x0B: Raul Alvarez - DISSECTING THE BOOT SECTOR: The hunt for ransomware in the boot process
Debugging Petya bootloader with IDA
Update: Automating the Process of Hijacking Digital Signature Verification
What does it mean to trust your boot process? - Gabriela Limonta - code::dive 2019
DEFCON 15: Hacking the Extensible Firmware Interface
MBR Ransomware in action
OffensiveCon18 - Joe Bialek - The Evolution of CFI Attacks and Defenses
Sad Computer Ransomware. Should we click?
AppCheck Anti-Ransomware vs RedEye ransomware
Insomni'hack 2017 - Welcome - Alain Mowat
DefCamp 2017 - Sharper than a Phisher’s Hook – The Story of an Email Autopsy
Petya
How to prevet phone hacking and protect your cell phone | Naver use a Mobile without doing this
DefCamp 2017 - IoT botnets? How do they work?
DefCamp 2017 - Evolution of threats to Electric Power Grid Operations
Graphic Booting Forums
Dissecting a ransomware infected MBR by RAUL ALVAREZ
309 Creating Your Own Customized Metamorphic Algorithm Raul Alvarez
Practical protection from firmware attacks in hardware supply chain | Sophia d’Antoine | Hardwear.io
Compromise Windows PC With Simple Malware| Malware Creation On Metasploit|Msfvenom Tutorial