Click here to download all references as Bib-File.

Enter keywords to filter the library entries below or Propose new Entry
2021-02-25DomainToolsJoe Slowik
The Continuous Conundrum of Cloud Atlas
2021-02-11DomainToolsJoe Slowik
Visibility, Monitoring, and Critical Infrastructure Security
Industroyer Stuxnet Triton
2021-02-09Stranded on Pylos BlogJoe Slowik
Water, Water Everywhere – But Nary a Hacker to Blame
2021-01-22DomainToolsJoe Slowik
Change in Perspective on the Utility of SUNBURST-related Network Indicators
SUNBURST
2021-01-14DomainToolsJoe Slowik
The Devil’s in the Details: SUNBURST Attribution
SUNBURST
2021-01-06DomainToolsJoe Slowik
Holiday Bazar: Tracking a TrickBot-Related Ransomware Incident
BazarBackdoor TrickBot
2021-01-04ProferoProfero, SecurityJoes
APT27 Turns to Ransomware
Clambling
2021-01-01DomainToolsJoe Slowik
Conceptualizing a Continuum of Cyber Threat Attribution
CHINACHOPPER SUNBURST
2020-12-23Stranded on Pylos BlogJoe Slowik
Mindmap on Russia-linked threat groups
2020-12-18DomainToolsJoe Slowik
Continuous Eruption: Further Analysis of the SolarWinds Supply Chain Incident
SUNBURST
2020-12-14DomainToolsJoe Slowik
Unraveling Network Infrastructure Linked to the SolarWinds Hack
SUNBURST
2020-12-10Stranded on Pylos BlogJoe Slowik
Terrorism or Information Operation?
2020-12-08DomainToolsJoe Slowik
Identifying Critical Infrastructure Targeting through Network Creation
2020-12-02DomainToolsJoe Slowik
Identifying Network Infrastructure Related to a World Health Organization Spoofing Campaign
Azorult Glupteba
2020-11-20DomainToolsBlack Lotus Labs, Joe Slowik, Lumen
Current Events to Widespread Campaigns: Pivoting from Samples to Identify Activity
2020-11-18DomainToolsJoe Slowik
Analyzing Network Infrastructure as Composite Objects
Ryuk
2020-11-11DomainToolsJoe Slowik
Extrapolating Adversary Intent Through Infrastructure
2020-11-04Stranded on Pylos BlogJoe Slowik
The Enigmatic Energetic Bear
EternalPetya Havex RAT
2020-10-30ReutersChristopher Bing, Joel Schectman, Raphael Satter
Russian hackers targeted California, Indiana Democratic parties
2020-09-24MicrosoftBen Koehl, Joe Hannon
Microsoft Security—detecting empires in the cloud