» Robust Indicators of Compromise for SUNBURST
» Finding Targeted SUNBURST Victims with pDNS
» Extracting Security Products from SUNBURST DNS Beacons
» Reassembling Victim Domain Fragments from SUNBURST DNS
» Capturing Decrypted TLS Traffic with Arkime
Grab our FeedBurner or RSS feed
Follow @netresec on twitter:
» twitter.com/netresec
» The Practice of Network Security Monitoring, Richard Bejtlich (2013)
» Applied Network Security Monitoring, Chris Sanders and Jason Smith (2013)
» Network Forensics, Sherri Davidoff and Jonathan Ham (2012)
» The Tao of Network Security Monitoring, Richard Bejtlich (2004)
» Practical Packet Analysis, Chris Sanders (2017)
» Windows Forensic Analysis, Harlan Carvey (2009)
» TCP/IP Illustrated, Volume 1, Kevin Fall and Richard Stevens (2011)
» Industrial Network Security, Eric D. Knapp and Joel Langill (2014)