Click here to download all references as Bib-File.•
2023-06-14
⋅
PICUS Security
⋅
Picus Cyber Threat Intelligence Report May 2023: Top 10 MITRE ATT&CK Techniques Earth Longzhi |
2022-07-29
⋅
PICUS Security
⋅
H0lyGh0st - North Korean Threat Group Strikes Back With New Ransomware SiennaBlue SiennaPurple Storm-0530 |
2022-02-21
⋅
PICUS Security
⋅
TTPs used by BlackByte Ransomware Targeting Critical Infrastructure BlackByte |
2021-10-28
⋅
PICUS Security
⋅
A Detailed Walkthrough of Ranzy Locker Ransomware TTPs ThunderX |
2021-03-10
⋅
PICUS Security
⋅
Tactics, Techniques, and Procedures (TTPs) Used by HAFNIUM to Target Microsoft Exchange Servers CHINACHOPPER |
2020-12-15
⋅
PICUS Security
⋅
Tactics, Techniques, and Procedures (TTPs) Used in the SolarWinds Breach Cobalt Strike SUNBURST |
2020-12-10
⋅
PICUS Security
⋅
Tactics, Techniques and Procedures (TTPs) Utilized by FireEye’s Red Team Tools |
2020-12-03
⋅
PICUS Security
⋅
How to Beat Nefilim Ransomware Attacks Nefilim |
2020-05-21
⋅
PICUS Security
⋅
T1055 Process Injection BlackEnergy Cardinal RAT Downdelph Emotet Kazuar RokRAT SOUNDBITE |
2020-02-08
⋅
PICUS Security
⋅
Emotet Technical Analysis - Part 2 PowerShell Unveiled Emotet |
2020-01-30
⋅
PICUS Security
⋅
Emotet Technical Analysis - Part 1 Reveal the Evil Code Emotet |