Click here to download all references as Bib-File.•
2023-02-08
⋅
Huntress Labs
⋅
Investigating Intrusions From Intriguing Exploits Silence |
2022-11-23
⋅
Stranded on Pylos Blog
⋅
Detailing Daily Domain Hunting |
2022-04-23
⋅
Stranded on Pylos Blog
⋅
Industroyer2 in Perspective INDUSTROYER2 |
2022-01-27
⋅
Gigamon
⋅
Focusing on “Left of Boom” WhisperGate |
2021-12-30
⋅
Stranded on Pylos Blog
⋅
Lights Out in Isfahan |
2021-12-21
⋅
Gigamon
⋅
The Log Keeps Rolling On: Evaluating Log4j Developments and Defensive Requirements |
2021-12-14
⋅
Gigamon
⋅
Network Security Monitoring Opportunities and Best Practices for Log4j Defense |
2021-10-25
⋅
Gigamon
⋅
Bear in the Net: A Network-Focused Perspective on Berserk Bear |
2021-09-10
⋅
Gigamon
⋅
Rendering Threats: A Network Perspective BumbleBee Cobalt Strike |
2021-09-09
⋅
Stranded on Pylos Blog
⋅
A Spectrum of State Ransomware Responsibility |
2021-07-27
⋅
Gigamon
⋅
Ghosts on the Wire: Expanding Conceptions of Network Anomalies SUNBURST |
2021-07-08
⋅
Gigamon
⋅
Observations and Recommendations from the Ongoing REvil-Kaseya Incident REvil |
2021-06-24
⋅
Gigamon
⋅
The Baffling Berserk Bear: A Decade's Activity targeting Critical Infrastructure Havex RAT Heriplor Karagany |
2021-06-17
⋅
Gigamon
⋅
Hold the Door: Examining Exfiltration Activity and Applying Countermeasures |
2021-05-17
⋅
Gigamon
⋅
Tracking DarkSide and Ransomware: The Network View DarkSide DarkSide |
2021-05-13
⋅
Stranded on Pylos Blog
⋅
Mind the (Air) Gap DarkSide |
2021-04-29
⋅
DomainTools
⋅
Leaping Down a Rabbit Hole of Fraud and Misdirection |
2021-04-22
⋅
DomainTools
⋅
An Undersea Royal Road: Exploring Malicious Documents and Associated Malware |
2021-04-01
⋅
DomainTools
⋅
COVID-19 Phishing With a Side of Cobalt Strike Cobalt Strike |
2021-03-10
⋅
DomainTools
⋅
Examining Exchange Exploitation and its Lessons for Defenders CHINACHOPPER |