Click here to download all references as Bib-File.•
2021-07-22
⋅
Bleeping Computer
⋅
Kaseya obtains universal decryptor for REvil ransomware victims REvil |
2021-07-15
⋅
ReversingLabs
⋅
Data Exfiltrator - A New Tactic for Ransomware Adversaries DataExfiltrator |
2021-07-12
⋅
Proofpoint
⋅
Operation SpoofedScholars: A Conversation with TA453 |
2021-06-30
⋅
Advanced Intelligence
⋅
Ransomware-&-CVE: Industry Insights Into Exclusive High-Value Target Adversarial Datasets BlackKingdom Ransomware Clop dearcry Hades REvil |
2021-06-29
⋅
Silverado Policy Accelerator
⋅
Cyber Strategy in the Biden Era: A Conversation with Anne Neuberger |
2021-06-03
⋅
Secureworks
⋅
OAuth’s Device Code Flow Abused in Phishing Attacks |
2021-05-20
⋅
Wired
⋅
The Full Story of the Stunning RSA Hack Can Finally Be Told |
2021-05-18
⋅
Sophos
⋅
The Active Adversary Playbook 2021 Cobalt Strike MimiKatz |
2021-05-06
⋅
Black Hat
⋅
How Did the Adversaries Abusing Bitcoin Blockchain Evade Our Takeover Cerber Pony |
2021-04-17
⋅
Advanced Intelligence
⋅
Adversary Dossier: Ryuk Ransomware Anatomy of an Attack in 2021 Ryuk |
2021-02-09
⋅
Medium (@alex.birsan)
⋅
Dependency Confusion: How I Hacked Into Apple, Microsoft and Dozens of Other Companies |
2021-01-07
⋅
Recorded Future
⋅
Aversary Infrastructure Report 2020: A Defender's View Octopus pupy Cobalt Strike Empire Downloader Meterpreter PoshC2 |
2020-12-16
⋅
Fortinet
⋅
Adversary Playbook: JavaScript RAT Looking for that Government Cheese JSOutProx |
2020-11-11
⋅
DomainTools
⋅
Extrapolating Adversary Intent Through Infrastructure |
2020-11-05
⋅
Github (scythe-io)
⋅
Ryuk Adversary Emulation Plan Ryuk |
2020-10-27
⋅
Sophos Managed Threat Response (MTR)
⋅
MTR Casebook: An active adversary caught in the act Cobalt Strike |
2020-09-15
⋅
Seguranca Informatica
⋅
Threat analysis: The emergent URSA trojan impacts many countries using a sophisticated loader Mispadu |
2020-09-11
⋅
RSA Conference (YouTube)
⋅
Two weeks with a Russian Ransomware Cell HILDACRYPT |
2020-08-11
⋅
FireEye
⋅
COOKIEJAR: Tracking Adversaries With FireEye Endpoint Security’s Logon Tracker Module |
2020-07-17
⋅
Zscaler
⋅
New Voicemail-Themed Phishing Attacks Use Evasion Techniques and Steal Credentials |