Click here to download all references as Bib-File.•
2021-07-07
⋅
CrowdStrike
⋅
How CrowdStrike Falcon Stops REvil Ransomware Used in the Kaseya Attack REvil |
2021-05-18
⋅
CrowdStrike
⋅
DarkSide Goes Dark: How CrowdStrike Falcon Customers Were Protected DarkSide DarkSide |
2018-05-21
⋅
CrowdStrike
⋅
An In-Depth Analysis of Samsam Ransomware and BOSS SPIDER SamSam |
2018-01-25
⋅
CrowdStrike
⋅
WannaMine Cryptomining: Harmless Nuisance or Disruptive Threat? WannaMine |
2017-11-10
⋅
CrowdStrike
⋅
CCleaner Stage 2: In-Depth Analysis of the Payload CCleaner Backdoor |
2017-10-04
⋅
CrowdStrike
⋅
Protecting the Software Supply Chain: Deep Insights into the CCleaner Backdoor CCleaner Backdoor |
2017-07-03
⋅
CrowdStrike
⋅
NotPetya Technical Analysis Part II: Further Findings and Potential for MBR Recovery EternalPetya |