PinnedSIMKRAinDetect FYICyberVolk RansomwareOr the war in the shadows of pro-Russian hacker groupsJul 28Jul 28
PinnedSIMKRAWhy CONTI has changed incident response — and why it’s not overPsychological Effects in the Apparent Lawless Space of CybercrimeJul 15Jul 15
PinnedSIMKRAinDetect FYIAkira in the Chang Way Server Ecosystem & Re-VictimizationAkira Countermeasure & Threat Hunting OpportunitiesJun 151Jun 151
PinnedSIMKRAinCyberScribersAPT28: From Initial Damage to Domain Controller Threats in an Hour (CERT-UA#8399)Translation of the CERT-UA Alert and Technical AnalysisJan 5Jan 5
PinnedSIMKRAinDetect FYISensor Mappings to ATT&CK (SMAP) — a concrete example of how to use the SMAP for a real world…Chinese State Sponsored Threat Actors ntds.dit & ntdsutilJan 21Jan 21
SIMKRAinDetect FYIUAC-0133 (Sandworm) plans for cyber sabotage at almost 20 critical infrastructure facilities in…Translation of the latest UA-CERT alert published today & Technical Analysis of QUEUESEED which is the KAPEKA Backdoor used in June 2022 in…Apr 19Apr 19
SIMKRAinDetect FYIMessengers and dating sites — new methods of attacks — Social Engineering ThreatsTranslation of the CERT-UA#9474 and Hunting OpportunitiesApr 18Apr 18
SIMKRAinCyberScribersAnalyzing Zero-Days like Operation MidnightEclips CVE-2024–3400 with the help of the M3TIDFrom Knowledge to Understanding — Threat-Informed Defense in Vulnerability ManagementApr 14Apr 14
SIMKRAinDetect FYISysmon File Block Execution — How we can use Sysmon to block Hermetic Wiper, RMM Tools and…As backup for EDR systems also in ICS environmentsMar 191Mar 191
SIMKRAinDetect FYIDemystification 8Base- Threat Hunting and Detection OpportunitiesThe Honest Pentester under the Radar who’s Mastermind bind them allFeb 25Feb 25