Click here to download all references as Bib-File.
2020-10-12 ⋅ KELA ⋅ KELA’s 100 Over 100: September 2020 in Network Access Sales |
2020-09-18 ⋅ KELA ⋅ The Initial Access Broker’s Toolbox – Remote Monitoring and Management |
2020-08-06 ⋅ KELA ⋅ The Secret Life of an Initial Access Broker |
2020-07-22 ⋅ KELA ⋅ Slacking Off – Slack and the Corporate Attack Surface Landscape |
2020-06-08 ⋅ KELA ⋅ Schrodinger’s Threat – MagBo Adapts Access Control Policies |
2020-05-13 ⋅ KELA ⋅ Access-as-a-Service – Remote Access Markets in the Cybercrime Underground |
2020-02-26 ⋅ KELA ⋅ What’s Dead May Never Die: AZORult Infostealer Decommissioned Again Azorult |
2020-02-21 ⋅ KELA ⋅ Exploring the Genesis Supply Chain for Fun and Profit: Part 1 – Misadventures in GUIDology Azorult |
2020-01-26 ⋅ KELA ⋅ One Attacker’s Trash is Another Attacker’s Treasure: A New Ecosystem Drives Cybercrime Innovation |