Click here to download all references as Bib-File.•
2021-02-25
⋅
DomainTools
⋅
The Continuous Conundrum of Cloud Atlas |
2021-02-11
⋅
DomainTools
⋅
Visibility, Monitoring, and Critical Infrastructure Security Industroyer Stuxnet Triton |
2021-02-09
⋅
Stranded on Pylos Blog
⋅
Water, Water Everywhere – But Nary a Hacker to Blame |
2021-01-22
⋅
DomainTools
⋅
Change in Perspective on the Utility of SUNBURST-related Network Indicators SUNBURST |
2021-01-14
⋅
DomainTools
⋅
The Devil’s in the Details: SUNBURST Attribution SUNBURST |
2021-01-06
⋅
DomainTools
⋅
Holiday Bazar: Tracking a TrickBot-Related Ransomware Incident BazarBackdoor TrickBot |
2021-01-04
⋅
Profero
⋅
APT27 Turns to Ransomware Clambling |
2021-01-01
⋅
DomainTools
⋅
Conceptualizing a Continuum of Cyber Threat Attribution CHINACHOPPER SUNBURST |
2020-12-23
⋅
Stranded on Pylos Blog
⋅
Mindmap on Russia-linked threat groups |
2020-12-18
⋅
DomainTools
⋅
Continuous Eruption: Further Analysis of the SolarWinds Supply Chain Incident SUNBURST |
2020-12-14
⋅
DomainTools
⋅
Unraveling Network Infrastructure Linked to the SolarWinds Hack SUNBURST |
2020-12-10
⋅
Stranded on Pylos Blog
⋅
Terrorism or Information Operation? |
2020-12-08
⋅
DomainTools
⋅
Identifying Critical Infrastructure Targeting through Network Creation |
2020-12-02
⋅
DomainTools
⋅
Identifying Network Infrastructure Related to a World Health Organization Spoofing Campaign Azorult Glupteba |
2020-11-20
⋅
DomainTools
⋅
Current Events to Widespread Campaigns: Pivoting from Samples to Identify Activity |
2020-11-18
⋅
DomainTools
⋅
Analyzing Network Infrastructure as Composite Objects Ryuk |
2020-11-11
⋅
DomainTools
⋅
Extrapolating Adversary Intent Through Infrastructure |
2020-11-04
⋅
Stranded on Pylos Blog
⋅
The Enigmatic Energetic Bear EternalPetya Havex RAT |
2020-10-30
⋅
Reuters
⋅
Russian hackers targeted California, Indiana Democratic parties |
2020-09-24
⋅
Microsoft
⋅
Microsoft Security—detecting empires in the cloud |