Click here to download all references as Bib-File.
2022-08-04 ⋅ nccgroup ⋅ Top of the Pops: Three common ransomware entry techniques |
2022-07-13 ⋅ NCC Group ⋅ Climbing Mount Everest: Black-Byte Bytes Back? BlackByte |
2022-03-31 ⋅ nccgroup ⋅ Conti-nuation: methods and techniques observed in operations post the leaks Cobalt Strike Conti QakBot |
2022-03-03 ⋅ NCC Group ⋅ SharkBot: a “new” generation Android banking Trojan being distributed on Google Play Store SharkBot |
2021-12-12 ⋅ NCC Group ⋅ Log4Shell: Reconnaissance and post exploitation network detection |
2021-11-08 ⋅ NCC Group ⋅ TA505 exploits SolarWinds Serv-U vulnerability (CVE-2021-35211) for initial access |