Click here to download all references as Bib-File.•
2020-10-12
⋅
KELA
⋅
KELA’s 100 Over 100: September 2020 in Network Access Sales |
2020-09-18
⋅
KELA
⋅
The Initial Access Broker’s Toolbox – Remote Monitoring and Management |
2020-08-06
⋅
KELA
⋅
The Secret Life of an Initial Access Broker |
2020-07-22
⋅
KELA
⋅
Slacking Off – Slack and the Corporate Attack Surface Landscape |
2020-06-08
⋅
KELA
⋅
Schrodinger’s Threat – MagBo Adapts Access Control Policies |
2020-05-13
⋅
KELA
⋅
Access-as-a-Service – Remote Access Markets in the Cybercrime Underground |
2020-02-26
⋅
KELA
⋅
What’s Dead May Never Die: AZORult Infostealer Decommissioned Again Azorult |
2020-02-21
⋅
KELA
⋅
Exploring the Genesis Supply Chain for Fun and Profit: Part 1 – Misadventures in GUIDology Azorult |
2020-01-26
⋅
KELA
⋅
One Attacker’s Trash is Another Attacker’s Treasure: A New Ecosystem Drives Cybercrime Innovation |