Click here to download all references as Bib-File.

Enter keywords to filter the library entries below or Propose new Entry
2020-12-23Stranded on Pylos BlogJoe Slowik
Mindmap on Russia-linked threat groups
2020-12-18DomainToolsJoe Slowik
Continuous Eruption: Further Analysis of the SolarWinds Supply Chain Incident
SUNBURST
2020-12-14DomainToolsJoe Slowik
Unraveling Network Infrastructure Linked to the SolarWinds Hack
SUNBURST
2020-12-10Stranded on Pylos BlogJoe Slowik
Terrorism or Information Operation?
2020-12-08DomainToolsJoe Slowik
Identifying Critical Infrastructure Targeting through Network Creation
2020-12-02DomainToolsJoe Slowik
Identifying Network Infrastructure Related to a World Health Organization Spoofing Campaign
Azorult Glupteba
2020-11-20DomainToolsBlack Lotus Labs, Joe Slowik, Lumen
Current Events to Widespread Campaigns: Pivoting from Samples to Identify Activity
2020-11-18DomainToolsJoe Slowik
Analyzing Network Infrastructure as Composite Objects
Ryuk
2020-11-11DomainToolsJoe Slowik
Extrapolating Adversary Intent Through Infrastructure
2020-11-04Stranded on Pylos BlogJoe Slowik
The Enigmatic Energetic Bear
EternalPetya Havex RAT
2020-10-30ReutersChristopher Bing, Joel Schectman, Raphael Satter
Russian hackers targeted California, Indiana Democratic parties
2020-09-24MicrosoftBen Koehl, Joe Hannon
Microsoft Security—detecting empires in the cloud
2020-09-24Github (FortyNorthSecurity)Joe Leon, Matt Grandy
Offensive Maldocs in 2020
2020-09-24MicrosoftBen Koehl, Joe Hannon, Microsoft Identity Security Team
Microsoft Security—detecting empires in the cloud
CACTUSTORCH LazyCat APT40
2020-09-23Stranded on Pylos BlogJoe Slowik
Understanding Uncertainty while Undermining Democracy
2020-09-21Cisco TalosJoe Marshall, JON MUNSHAW, Nick Mavis
The art and science of detecting Cobalt Strike
Cobalt Strike
2020-09-17Joe Security's BlogJoe Security
GuLoader's VM-Exit Instruction Hammering explained
CloudEyE
2020-07-13JoeSecurityJoe Security
TrickBot's new API-Hammering explained
TrickBot
2020-06-18DragosJoe Slowik
EKANS Ransomware Misconceptions and Misunderstandings
Snake
2020-06-11Talos IntelligenceJoe Marshall, Kendall McKay
Tor2Mine is up to their old tricks — and adds a few new ones
Azorult Remcos