Click here to download all references as Bib-File.•
| 2022-08-04
            
            ⋅
            
            nccgroup
            ⋅ Top of the Pops: Three common ransomware entry techniques | 
| 2022-07-13
            
            ⋅
            
            NCC Group
            ⋅ Climbing Mount Everest: Black-Byte Bytes Back? BlackByte | 
| 2022-03-31
            
            ⋅
            
            nccgroup
            ⋅ Conti-nuation: methods and techniques observed in operations post the leaks Cobalt Strike Conti QakBot | 
| 2022-03-03
            
            ⋅
            
            NCC Group
            ⋅ SharkBot: a “new” generation Android banking Trojan being distributed on Google Play Store SharkBot | 
| 2021-12-12
            
            ⋅
            
            NCC Group
            ⋅ Log4Shell: Reconnaissance and post exploitation network detection | 
| 2021-11-08
            
            ⋅
            
            NCC Group
            ⋅ TA505 exploits SolarWinds Serv-U vulnerability (CVE-2021-35211) for initial access |