Click here to download all references as Bib-File.
2023-05-09 ⋅ paloalto Netoworks: Unit42 ⋅ Threat Assessment: Royal Ransomware Royal Ransom Royal Ransom |
2022-11-03 ⋅ paloalto Netoworks: Unit42 ⋅ Cobalt Strike Analysis and Tutorial: Identifying Beacon Team Servers in the Wild Cobalt Strike |
2022-10-31 ⋅ paloalto Netoworks: Unit42 ⋅ Banking Trojan Techniques: How Financially Motivated Malware Became Infrastructure Dridex Kronos TrickBot Zeus |
2022-03-24 ⋅ paloalto Netoworks: Unit42 ⋅ Threat Brief: Lapsus$ Group RedLine Stealer |
2022-03-16 ⋅ paloalto Netoworks: Unit42 ⋅ Cobalt Strike Analysis and Tutorial: How Malleable C2 Profiles Make Cobalt Strike Difficult to Detect Cobalt Strike |
2021-10-18 ⋅ paloalto Netoworks: Unit42 ⋅ Case Study: From BazarLoader to Network Reconnaissance BazarBackdoor Cobalt Strike |
2021-08-10 ⋅ paloalto Netoworks: Unit42 ⋅ New eCh0raix Ransomware Variant Targets QNAP and Synology Network-Attached Storage Devices QNAPCrypt |
2020-09-23 ⋅ paloalto Netoworks: Unit42 ⋅ Case Study: Emotet Thread Hijacking, an Email Attack Technique Emotet |
2019-01-08 ⋅ paloalto Netoworks: Unit42 ⋅ DarkHydrus delivers new Trojan that can use Google Drive for C2 communications RogueRobinNET DarkHydrus |