Click here to download all references as Bib-File.

Enter keywords to filter the library entries below or Propose new Entry
2021-08-04Trend MicroJanus Agcaoili, Jessie Prevost, Joelson Soares, Ryan Maglaque
Supply Chain Attacks from a Managed Detection and Response Perspective
2021-07-27GigamonJoe Slowik
Ghosts on the Wire: Expanding Conceptions of Network Anomalies
2021-07-19ProofpointJoe Wise, Konstantin Klinger, Proofpoint Threat Research Team, Selena Larson
New Threat Actor Uses Spanish Language Lures to Distribute Seldom Observed Bandook Malware
Bandook Caliente Bandits
2021-07-08GigamonJoe Slowik
Observations and Recommendations from the Ongoing REvil-Kaseya Incident
2021-06-24GigamonJoe Slowik
The Baffling Berserk Bear: A Decade's Activity targeting Critical Infrastructure
Havex RAT Heriplor Karagany
2021-06-22ProferoProfero, SecurityJoes
Secrets Behind Ever101 Ransomware
2021-06-17GigamonJoe Slowik
Hold the Door: Examining Exfiltration Activity and Applying Countermeasures
2021-06-09Twitter (@SecurityJoes)SecurityJoes
Tweet on .NET builder of a Ryuk imposter malware
2021-05-17GigamonJoe Slowik
Tracking DarkSide and Ransomware: The Network View
DarkSide DarkSide
2021-05-13Stranded on Pylos BlogJoe Slowik
Mind the (Air) Gap
2021-05-05ProferoProfero, SecurityJoes
Cuba Ransomware Group on a Roll
2021-04-29DomainToolsJoe Slowik
Leaping Down a Rabbit Hole of Fraud and Misdirection
2021-04-22DomainToolsJoe Slowik
An Undersea Royal Road: Exploring Malicious Documents and Associated Malware
2021-04-17YouTube (Worcester DEFCON Group)Joel Snape, Nettitude
Inside IcedID: Anatomy Of An Infostealer
2021-04-01DomainToolsJoe Slowik
COVID-19 Phishing With a Side of Cobalt Strike
Cobalt Strike
2021-03-16ElasticJoe Desimone
Detecting Cobalt Strike with memory signatures
Cobalt Strike
2021-03-10DomainToolsJoe Slowik
Examining Exchange Exploitation and its Lessons for Defenders
2021-03-03DomainToolsJoe Slowik
Centreon to Exim and Back: On the Trail of Sandworm
Exaramel PAS
2021-02-25DomainToolsJoe Slowik
The Continuous Conundrum of Cloud Atlas
2021-02-11DomainToolsJoe Slowik
Visibility, Monitoring, and Critical Infrastructure Security
Industroyer Stuxnet Triton