Click here to download all references as Bib-File.
2023-02-08 ⋅ Huntress Labs ⋅ Investigating Intrusions From Intriguing Exploits Silence |
2022-11-23 ⋅ Stranded on Pylos Blog ⋅ Detailing Daily Domain Hunting |
2022-04-23 ⋅ Stranded on Pylos Blog ⋅ Industroyer2 in Perspective INDUSTROYER2 |
2022-01-27 ⋅ Gigamon ⋅ Focusing on “Left of Boom” WhisperGate |
2021-12-30 ⋅ Stranded on Pylos Blog ⋅ Lights Out in Isfahan |
2021-12-21 ⋅ Gigamon ⋅ The Log Keeps Rolling On: Evaluating Log4j Developments and Defensive Requirements |
2021-12-14 ⋅ Gigamon ⋅ Network Security Monitoring Opportunities and Best Practices for Log4j Defense |
2021-10-25 ⋅ Gigamon ⋅ Bear in the Net: A Network-Focused Perspective on Berserk Bear |
2021-09-10 ⋅ Gigamon ⋅ Rendering Threats: A Network Perspective BumbleBee Cobalt Strike |
2021-09-09 ⋅ Stranded on Pylos Blog ⋅ A Spectrum of State Ransomware Responsibility |
2021-07-27 ⋅ Gigamon ⋅ Ghosts on the Wire: Expanding Conceptions of Network Anomalies SUNBURST |
2021-07-08 ⋅ Gigamon ⋅ Observations and Recommendations from the Ongoing REvil-Kaseya Incident REvil |
2021-06-24 ⋅ Gigamon ⋅ The Baffling Berserk Bear: A Decade's Activity targeting Critical Infrastructure Havex RAT Heriplor Karagany |
2021-06-17 ⋅ Gigamon ⋅ Hold the Door: Examining Exfiltration Activity and Applying Countermeasures |
2021-05-17 ⋅ Gigamon ⋅ Tracking DarkSide and Ransomware: The Network View DarkSide DarkSide |
2021-05-13 ⋅ Stranded on Pylos Blog ⋅ Mind the (Air) Gap DarkSide |
2021-04-29 ⋅ DomainTools ⋅ Leaping Down a Rabbit Hole of Fraud and Misdirection |
2021-04-22 ⋅ DomainTools ⋅ An Undersea Royal Road: Exploring Malicious Documents and Associated Malware |
2021-04-01 ⋅ DomainTools ⋅ COVID-19 Phishing With a Side of Cobalt Strike Cobalt Strike |
2021-03-10 ⋅ DomainTools ⋅ Examining Exchange Exploitation and its Lessons for Defenders CHINACHOPPER |