Click here to download all references as Bib-File.
2020-12-18 ⋅ Microsoft ⋅ Analyzing Solorigate, the compromised DLL file that started a sophisticated cyberattack, and how Microsoft Defender helps protect customers SUNBURST SUPERNOVA TEARDROP UNC2452 |
2020-11-30 ⋅ Microsoft ⋅ Threat actor (BISMUTH) leverages coin miner techniques to stay under the radar – here’s how to spot them Cobalt Strike |
2020-09-10 ⋅ Microsoft ⋅ STRONTIUM: Detecting new patterns in credential harvesting Sofacy |