Click here to download all references as Bib-File.

Enter keywords to filter the library entries below or Propose new Entry
2021-03-03DomainToolsJoe Slowik
Centreon to Exim and Back: On the Trail of Sandworm
Exaramel PAS
2021-02-25DomainToolsJoe Slowik
The Continuous Conundrum of Cloud Atlas
2021-02-11DomainToolsJoe Slowik
Visibility, Monitoring, and Critical Infrastructure Security
Industroyer Stuxnet Triton
2021-02-09Stranded on Pylos BlogJoe Slowik
Water, Water Everywhere – But Nary a Hacker to Blame
2021-01-22DomainToolsJoe Slowik
Change in Perspective on the Utility of SUNBURST-related Network Indicators
SUNBURST
2021-01-14DomainToolsJoe Slowik
The Devil’s in the Details: SUNBURST Attribution
SUNBURST
2021-01-06DomainToolsJoe Slowik
Holiday Bazar: Tracking a TrickBot-Related Ransomware Incident
BazarBackdoor TrickBot
2021-01-01DomainToolsJoe Slowik
Conceptualizing a Continuum of Cyber Threat Attribution
CHINACHOPPER SUNBURST
2020-12-23Stranded on Pylos BlogJoe Slowik
Mindmap on Russia-linked threat groups
2020-12-18DomainToolsJoe Slowik
Continuous Eruption: Further Analysis of the SolarWinds Supply Chain Incident
SUNBURST
2020-12-14DomainToolsJoe Slowik
Unraveling Network Infrastructure Linked to the SolarWinds Hack
SUNBURST
2020-12-10Stranded on Pylos BlogJoe Slowik
Terrorism or Information Operation?
2020-12-08DomainToolsJoe Slowik
Identifying Critical Infrastructure Targeting through Network Creation
2020-12-02DomainToolsJoe Slowik
Identifying Network Infrastructure Related to a World Health Organization Spoofing Campaign
Azorult Glupteba
2020-11-20DomainToolsBlack Lotus Labs, Joe Slowik, Lumen
Current Events to Widespread Campaigns: Pivoting from Samples to Identify Activity
2020-11-18DomainToolsJoe Slowik
Analyzing Network Infrastructure as Composite Objects
Ryuk
2020-11-11DomainToolsJoe Slowik
Extrapolating Adversary Intent Through Infrastructure
2020-11-04Stranded on Pylos BlogJoe Slowik
The Enigmatic Energetic Bear
EternalPetya Havex RAT
2020-09-23Stranded on Pylos BlogJoe Slowik
Understanding Uncertainty while Undermining Democracy
2020-06-18DragosJoe Slowik
EKANS Ransomware Misconceptions and Misunderstandings
Snake
2020-05-28Stranded on Pylos BlogJoe Slowik
Silos of Excellence
2020-03-01DragosJoe Slowik
Spyware Stealer Locker Wiper Locker Goga Revisited
LockerGoga
2020-01-01DragosJoe Slowik
Threat Intelligence and the Limits of Malware Analysis
Exaramel Exaramel Industroyer Lookback NjRAT PlugX