Click here to download all references as Bib-File.•
2021-03-10
⋅
DomainTools
⋅
Examining Exchange Exploitation and its Lessons for Defenders CHINACHOPPER |
2021-03-03
⋅
DomainTools
⋅
Centreon to Exim and Back: On the Trail of Sandworm Exaramel PAS |
2021-02-25
⋅
DomainTools
⋅
The Continuous Conundrum of Cloud Atlas |
2021-02-11
⋅
DomainTools
⋅
Visibility, Monitoring, and Critical Infrastructure Security Industroyer Stuxnet Triton |
2021-02-09
⋅
Stranded on Pylos Blog
⋅
Water, Water Everywhere – But Nary a Hacker to Blame |
2021-01-22
⋅
DomainTools
⋅
Change in Perspective on the Utility of SUNBURST-related Network Indicators SUNBURST |
2021-01-14
⋅
DomainTools
⋅
The Devil’s in the Details: SUNBURST Attribution SUNBURST |
2021-01-06
⋅
DomainTools
⋅
Holiday Bazar: Tracking a TrickBot-Related Ransomware Incident BazarBackdoor TrickBot |
2021-01-04
⋅
Profero
⋅
APT27 Turns to Ransomware Clambling |
2021-01-01
⋅
DomainTools
⋅
Conceptualizing a Continuum of Cyber Threat Attribution CHINACHOPPER SUNBURST |
2020-12-23
⋅
Stranded on Pylos Blog
⋅
Mindmap on Russia-linked threat groups |
2020-12-18
⋅
DomainTools
⋅
Continuous Eruption: Further Analysis of the SolarWinds Supply Chain Incident SUNBURST |
2020-12-14
⋅
DomainTools
⋅
Unraveling Network Infrastructure Linked to the SolarWinds Hack SUNBURST |
2020-12-10
⋅
Stranded on Pylos Blog
⋅
Terrorism or Information Operation? |
2020-12-08
⋅
DomainTools
⋅
Identifying Critical Infrastructure Targeting through Network Creation |
2020-12-02
⋅
DomainTools
⋅
Identifying Network Infrastructure Related to a World Health Organization Spoofing Campaign Azorult Glupteba |
2020-11-20
⋅
DomainTools
⋅
Current Events to Widespread Campaigns: Pivoting from Samples to Identify Activity |
2020-11-18
⋅
DomainTools
⋅
Analyzing Network Infrastructure as Composite Objects Ryuk |
2020-11-11
⋅
DomainTools
⋅
Extrapolating Adversary Intent Through Infrastructure |
2020-11-04
⋅
Stranded on Pylos Blog
⋅
The Enigmatic Energetic Bear EternalPetya Havex RAT |