Click here to download all references as Bib-File.

Enter keywords to filter the library entries below or Propose new Entry
2022-09-28GigamonPavle Culum, Roman Kroshinsky
Investigating Web Shells
Godzilla Webshell Behinder
2022-02-03GigamonMichael Lazic
Investigating Lateral Movement — WMI and Scheduled Tasks
2022-01-27GigamonJoe Slowik
Focusing on “Left of Boom”
WhisperGate
2021-12-21GigamonJoe Slowik
The Log Keeps Rolling On: Evaluating Log4j Developments and Defensive Requirements
2021-12-14GigamonJoe Slowik
Network Security Monitoring Opportunities and Best Practices for Log4j Defense
2021-10-25GigamonJoe Slowik
Bear in the Net: A Network-Focused Perspective on Berserk Bear
2021-09-10GigamonJoe Slowik
Rendering Threats: A Network Perspective
BumbleBee Cobalt Strike
2021-07-27GigamonJoe Slowik
Ghosts on the Wire: Expanding Conceptions of Network Anomalies
SUNBURST
2021-07-08GigamonJoe Slowik
Observations and Recommendations from the Ongoing REvil-Kaseya Incident
REvil
2021-06-24GigamonJoe Slowik
The Baffling Berserk Bear: A Decade's Activity targeting Critical Infrastructure
Havex RAT Heriplor Karagany
2021-06-17GigamonJoe Slowik
Hold the Door: Examining Exfiltration Activity and Applying Countermeasures
2021-05-17GigamonJoe Slowik
Tracking DarkSide and Ransomware: The Network View
DarkSide DarkSide
2020-01-13GigamonEd Miles, William Peteroy
Emotet: Not your Run-of-the-mill Malware
Emotet
2019-07-23GigamonEd Miles, Justin Warner, Kristina Savelesky
ABADBABE 8BADF00D: Discovering BADHATCH and a Detailed Look at FIN8’s Tooling
BADHATCH
2019-07-23GigamonEd Miles, Justin Warner, Kristina Savelesky
ABADBABE 8BADF00D: Discovering BADHATCH and a Detailed Look at FIN8’s Tooling
PoSlurp Powersniff
2018-06-07GigamonChenming Xu, Dan Caselden, Jason Jones, Justin Warner
Adobe Flash Zero-Day Leveraged for Targeted Attack in Middle East - Gigamon ATR Blog
Chainshot
2017-07-25GigamonApplied Threat Research Team
Footprints of Fin7: Tracking Actor Patterns (Part 1)
FIN7