Click here to download all references as Bib-File.

Enter keywords to filter the library entries below or Propose new Entry
2015-03-19Palo Alto Networks Unit 42Josh Grunzweig
FindPOS: New POS Malware Family Discovered
FindPOS
2015-01-26CrowdStrikeAndy Schworer, Josh Liburdi
Storm Chasing: Hunting Hurricane Panda
HURRICANE PANDA
2014-11-21FireEyeJoshua Homan, Mike Oppenheim, Mike Scott, Ned Moran
Operation Double Tap
pirpi
2014-07-31FireEyeJoshua Homan, Nart Villeneuve
Spy of the Tiger
paladin APT24
2014-07-15Palo Alto Networks Unit 42Josh Grunzweig
Unit 42 Technical Analysis: Seaduke
SEADADDY
2014-07-09FireEyeJoshua Homan, Kyle Wilhoit, Nart Villeneuve
BrutPOS: RDP Bruteforcing Botnet Targeting POS Systems
BrutPOS
2013-12-09TrustwaveJosh Grunzweig
The Curious Case of the Malicious IIS Module
IISniff
2013-09-26MalwarebytesJoshua Cannell
New Solarbot Malware Debuts, Creator Publicly Advertising
Solarbot
2013-08-01MalwarebytesJoshua Cannell
Sophos Discovers ZeroAccess Using RLO
ZeroAccess
2013-07-25MalwarebytesJoshua Cannell
ZeroAccess uses Self-Debugging
ZeroAccess
2013-06-03TrustwaveJosh Grunzweig
Alina: Following The Shadow Part 2
Alina POS
2013-05-17TrustwaveJosh Grunzweig
Alina: Following The Shadow Part 1
Alina POS
2013-05-08SpiderLabs BlogJosh Grunzweig
Alina: Casting a Shadow on POS
Alina POS
2012-12-13SpiderLabs BlogJosh Grunzweig
The Dexter Malware: Getting Your Hands Dirty