Persistence: The Art of Staying Hidden
Dark Side of Scripting: How Ransomware Abuses Powerful Tools
Ransomware Tactics: Leveraging Legitimate Tools and Advanced Techniques
Understanding Infection Vectors in Ransomware Attacks
Enhancing Your Logging Capabilities with Sysmon for ransomware/Any type of attack
Enhancing Windows Security with Log-MD
Tools for Ransomware Analysis and Response
Windows Environment Variables for Ransomware Analysis
Ransomware Analysis: A Examiner’s Guide
Understanding Ransomware Hosting and Affiliate Programs
Running Plaso/Log2Timeline on Windows
How Ransomware Operators Communicate and Share Data
Understanding the Ransomware Extortion Types, DLSs, Resources
Ever-Evolving World of Ransomware: Evolution Over Time
Understanding Ransomware-as-a-Service (RaaS) Part 4: RaaS Dashboards and Darknet Marketplaces
Understanding Ransomware-as-a-Service (RaaS) Part 3: Exploring Ransomware Builders
Understanding Ransomware-as-a-Service (RaaS) Part 2: The Roles of Initial Access Brokers (IABs) and Ransomware Builders
The Evolution of Ransomware: Understanding the Ransomware-as-a-Service (RaaS) Model
The Untold Origins and Evolution of Ransomware
Rethinking Incident Response: From PICERL to DAIR