Click here to download all references as Bib-File.
2022-09-21 ⋅ Microsoft ⋅ The art and science behind Microsoft threat hunting: Part 2 |
2022-09-08 ⋅ Microsoft ⋅ The art and science behind Microsoft threat hunting: Part 1 |
2022-08-24 ⋅ Microsoft ⋅ MagicWeb: NOBELIUM’s post-compromise trick to authenticate as anyone |
2022-04-12 ⋅ Microsoft Security ⋅ Tarrask malware uses scheduled tasks for defense evasion Godzilla Webshell |
2022-03-22 ⋅ Microsoft ⋅ DEV-0537 (UNC3661) criminal actor targeting organizations for data exfiltration and destruction RedLine Stealer LAPSUS |
2022-03-11 ⋅ Microsoft ⋅ Part 2: LockBit 2.0 ransomware bugs and database recovery attempts LockBit |
2022-03-11 ⋅ Microsoft ⋅ Part 1: LockBit 2.0 ransomware bugs and database recovery attempts LockBit |
2022-01-15 ⋅ Microsoft ⋅ Destructive malware targeting Ukrainian organizations (DEV-0586) WhisperGate DEV-0586 |
2022-01-04 ⋅ Microsoft ⋅ Leveraging the Power of KQL in Incident Response |
2021-12-06 ⋅ Mandiant ⋅ Suspected Russian Activity Targeting Government and Business Entities Around the Globe (UNC2452) Cobalt Strike CryptBot |
2021-10-26 ⋅ Microsoft ⋅ Protect your business from password sprays with Microsoft DART recommendations |
2021-09-27 ⋅ Microsoft ⋅ A guide to combatting human-operated ransomware: Part 2 |
2021-09-20 ⋅ Microsoft ⋅ A guide to combatting human-operated ransomware: Part 1 |
2021-02-11 ⋅ Microsoft ⋅ Web shell attacks continue to rise |
2020-12-21 ⋅ Microsoft ⋅ Advice for incident responders on recovery from systemic identity compromises |