Click here to download all references as Bib-File.
|2021-07-07 ⋅ CrowdStrike ⋅ |
How CrowdStrike Falcon Stops REvil Ransomware Used in the Kaseya Attack
|2020-05-18 ⋅ CrowdStrike ⋅ |
DarkSide Goes Dark: How CrowdStrike Falcon Customers Were Protected
|2018-05-21 ⋅ CrowdStrike ⋅ |
An In-Depth Analysis of Samsam Ransomware and BOSS SPIDER
|2018-01-25 ⋅ CrowdStrike ⋅ |
WannaMine Cryptomining: Harmless Nuisance or Disruptive Threat?
|2017-11-10 ⋅ CrowdStrike ⋅ |
CCleaner Stage 2: In-Depth Analysis of the Payload
|2017-10-04 ⋅ CrowdStrike ⋅ |
Protecting the Software Supply Chain: Deep Insights into the CCleaner Backdoor
|2017-07-03 ⋅ CrowdStrike ⋅ |
NotPetya Technical Analysis Part II: Further Findings and Potential for MBR Recovery