Click here to download all references as Bib-File.

Enter keywords to filter the library entries below or Propose new Entry
2015-12-22Bryan Lee, Josh Grunzweig
BBSRAT Attacks Targeting Russian Organizations Linked to Roaming Tiger
Roaming Tiger
2015-10-09Palo Alto Networks Unit 42Josh Grunzweig
Latest TeslaCrypt Ransomware Borrows Code From Carberp Trojan
TeslaCrypt
2015-08-20Palo Alto Networks Unit 42Brandon Levene, Bryan Lee, Josh Grunzweig, Robert Falcone, Ryan Olson
Retefe Banking Trojan Targets Sweden, Switzerland and Japan
Retefe
2015-07-20paloalto Networks Unit 42Bryan Lee, Josh Grunzweig
Watering Hole Attack on Aerospace Firm Exploits CVE-2015-5122 to Install IsSpace Backdoor
IsSpace
2015-04-18FireEyeChris Phillips, Corbin Souffrant, Dan Caselden, Darien Kin, Genwei Jiang, James “Tom” Bennett, Jonathan Wrolstad, Joshua Homan, Yasir Khalid
Operation RussianDoll: Adobe & Windows Zero-Day Exploits Likely Leveraged by Russia’s APT28 in Highly-Targeted Attack
APT28
2015-04-14Palo Alto Networks Unit 42Jen Miller-Osborn, Josh Grunzweig
Unit 42 Identifies New DragonOK Backdoor Malware Deployed Against Japanese Targets
DragonOK
2015-04-14Palo Alto Networks Unit 42Jen Miller-Osborn, Josh Grunzweig
Unit 42 Identifies New DragonOK Backdoor Malware Deployed Against Japanese Targets
FormerFirstRAT
2015-03-19Palo Alto Networks Unit 42Josh Grunzweig
FindPOS: New POS Malware Family Discovered
FindPOS
2015-01-26CrowdStrikeAndy Schworer, Josh Liburdi
Storm Chasing: Hunting Hurricane Panda
HURRICANE PANDA
2014-11-21FireEyeJoshua Homan, Mike Oppenheim, Mike Scott, Ned Moran
Operation Double Tap
pirpi
2014-07-31FireEyeJoshua Homan, Nart Villeneuve
Spy of the Tiger
paladin APT24
2014-07-15Palo Alto Networks Unit 42Josh Grunzweig
Unit 42 Technical Analysis: Seaduke
SEADADDY
2014-07-09FireEyeJoshua Homan, Kyle Wilhoit, Nart Villeneuve
BrutPOS: RDP Bruteforcing Botnet Targeting POS Systems
BrutPOS
2013-12-09TrustwaveJosh Grunzweig
The Curious Case of the Malicious IIS Module
IISniff
2013-09-26MalwarebytesJoshua Cannell
New Solarbot Malware Debuts, Creator Publicly Advertising
Solarbot
2013-08-01MalwarebytesJoshua Cannell
Sophos Discovers ZeroAccess Using RLO
ZeroAccess
2013-07-25MalwarebytesJoshua Cannell
ZeroAccess uses Self-Debugging
ZeroAccess
2013-06-03TrustwaveJosh Grunzweig
Alina: Following The Shadow Part 2
Alina POS
2013-05-17TrustwaveJosh Grunzweig
Alina: Following The Shadow Part 1
Alina POS
2013-05-08SpiderLabs BlogJosh Grunzweig
Alina: Casting a Shadow on POS
Alina POS
2012-12-13SpiderLabs BlogJosh Grunzweig
The Dexter Malware: Getting Your Hands Dirty