Click here to download all references as Bib-File.
2022-02-21 ⋅ PICUS Security ⋅ TTPs used by BlackByte Ransomware Targeting Critical Infrastructure BlackByte |
2021-10-28 ⋅ PICUS Security ⋅ A Detailed Walkthrough of Ranzy Locker Ransomware TTPs ThunderX |
2021-03-10 ⋅ PICUS Security ⋅ Tactics, Techniques, and Procedures (TTPs) Used by HAFNIUM to Target Microsoft Exchange Servers CHINACHOPPER |
2020-12-15 ⋅ PICUS Security ⋅ Tactics, Techniques, and Procedures (TTPs) Used in the SolarWinds Breach Cobalt Strike SUNBURST |
2020-12-10 ⋅ PICUS Security ⋅ Tactics, Techniques and Procedures (TTPs) Utilized by FireEye’s Red Team Tools |
2020-12-03 ⋅ PICUS Security ⋅ How to Beat Nefilim Ransomware Attacks Nefilim |
2020-05-21 ⋅ PICUS Security ⋅ T1055 Process Injection BlackEnergy Cardinal RAT Downdelph Emotet Kazuar RokRAT SOUNDBITE |
2020-02-08 ⋅ PICUS Security ⋅ Emotet Technical Analysis - Part 2 PowerShell Unveiled Emotet |
2020-01-30 ⋅ PICUS Security ⋅ Emotet Technical Analysis - Part 1 Reveal the Evil Code Emotet |