Click here to download all references as Bib-File.•
| 2020-12-23
⋅
Stranded on Pylos Blog
⋅
Mindmap on Russia-linked threat groups |
| 2020-12-18
⋅
DomainTools
⋅
Continuous Eruption: Further Analysis of the SolarWinds Supply Chain Incident SUNBURST |
| 2020-12-14
⋅
DomainTools
⋅
Unraveling Network Infrastructure Linked to the SolarWinds Hack SUNBURST |
| 2020-12-10
⋅
Stranded on Pylos Blog
⋅
Terrorism or Information Operation? |
| 2020-12-08
⋅
DomainTools
⋅
Identifying Critical Infrastructure Targeting through Network Creation |
| 2020-12-02
⋅
DomainTools
⋅
Identifying Network Infrastructure Related to a World Health Organization Spoofing Campaign Azorult Glupteba |
| 2020-11-20
⋅
DomainTools
⋅
Current Events to Widespread Campaigns: Pivoting from Samples to Identify Activity |
| 2020-11-18
⋅
DomainTools
⋅
Analyzing Network Infrastructure as Composite Objects Ryuk |
| 2020-11-11
⋅
DomainTools
⋅
Extrapolating Adversary Intent Through Infrastructure |
| 2020-11-04
⋅
Stranded on Pylos Blog
⋅
The Enigmatic Energetic Bear EternalPetya Havex RAT |
| 2020-10-30
⋅
Reuters
⋅
Russian hackers targeted California, Indiana Democratic parties |
| 2020-09-24
⋅
Microsoft
⋅
Microsoft Security—detecting empires in the cloud |
| 2020-09-24
⋅
Github (FortyNorthSecurity)
⋅
Offensive Maldocs in 2020 |
| 2020-09-24
⋅
Microsoft
⋅
Microsoft Security—detecting empires in the cloud CACTUSTORCH LazyCat APT40 |
| 2020-09-23
⋅
Stranded on Pylos Blog
⋅
Understanding Uncertainty while Undermining Democracy |
| 2020-09-21
⋅
Cisco Talos
⋅
The art and science of detecting Cobalt Strike Cobalt Strike |
| 2020-09-17
⋅
Joe Security's Blog
⋅
GuLoader's VM-Exit Instruction Hammering explained CloudEyE |
| 2020-07-13
⋅
JoeSecurity
⋅
TrickBot's new API-Hammering explained TrickBot |
| 2020-06-18
⋅
Dragos
⋅
EKANS Ransomware Misconceptions and Misunderstandings Snake |
| 2020-06-11
⋅
Talos Intelligence
⋅
Tor2Mine is up to their old tricks — and adds a few new ones Azorult Remcos |