Click here to download all references as Bib-File.•
2022-09-21
⋅
Microsoft
⋅
The art and science behind Microsoft threat hunting: Part 2 |
2022-09-08
⋅
Microsoft
⋅
The art and science behind Microsoft threat hunting: Part 1 |
2022-08-24
⋅
Microsoft
⋅
MagicWeb: NOBELIUM’s post-compromise trick to authenticate as anyone |
2022-04-12
⋅
Microsoft Security
⋅
Tarrask malware uses scheduled tasks for defense evasion Godzilla Webshell |
2022-03-22
⋅
Microsoft
⋅
DEV-0537 (UNC3661) criminal actor targeting organizations for data exfiltration and destruction RedLine Stealer LAPSUS |
2022-03-11
⋅
Microsoft
⋅
Part 2: LockBit 2.0 ransomware bugs and database recovery attempts LockBit |
2022-03-11
⋅
Microsoft
⋅
Part 1: LockBit 2.0 ransomware bugs and database recovery attempts LockBit |
2022-01-15
⋅
Microsoft
⋅
Destructive malware targeting Ukrainian organizations (DEV-0586) WhisperGate DEV-0586 |
2022-01-04
⋅
Microsoft
⋅
Leveraging the Power of KQL in Incident Response |
2021-12-06
⋅
Mandiant
⋅
Suspected Russian Activity Targeting Government and Business Entities Around the Globe (UNC2452) Cobalt Strike CryptBot |
2021-10-26
⋅
Microsoft
⋅
Protect your business from password sprays with Microsoft DART recommendations |
2021-09-27
⋅
Microsoft
⋅
A guide to combatting human-operated ransomware: Part 2 |
2021-09-20
⋅
Microsoft
⋅
A guide to combatting human-operated ransomware: Part 1 |
2021-02-11
⋅
Microsoft
⋅
Web shell attacks continue to rise |
2020-12-21
⋅
Microsoft
⋅
Advice for incident responders on recovery from systemic identity compromises |