Click here to download all references as Bib-File.

Enter keywords to filter the library entries below or Propose new Entry
2016-08-13CrowdStrikeChris Scott, Wendi Whitmore
Detecting and Responding: Pandas and Bears
FOXY PANDA POISONUS PANDA
2016-08-01CrowdStrikeAdam Meyers
CrowdStrike’s New Methodology for Tracking eCrime
Corebot BOSON SPIDER
2016-06-15CrowdStrikeDmitri Alperovitch
Bears in the Midst: Intrusion into the Democratic National Committee
X-Agent ATI-Agent SEADADDY Seduploader X-Agent XTunnel APT28
2016-01-01CrowdStrikeChristopher Scott, Wendi Whitmore
Detecting and Responding: Pandas and Bears
ELOQUENT PANDA UNION PANDA
2016-01-01CrowdStrikeChristopher Scott, Wendi Whitmore
Detecting and Responding: Pandas and Bears
ELOQUENT PANDA UNION PANDA
2016-01-01CrowdStrikeCrowdStrike
Intelligence Report: Emergence and Development of Core Bot
Corebot BOSON SPIDER
2015-12-30CrowdStrikeAdam Kozy, Johannes Gilger
Bringing A Cannon To A Knife Fight
2015-12-30CrowdStrikeAdam Kozy, Johannes Gilger
Bringing A Cannon To A Knife Fight
2015-08-06CrowdStrikeAdam Kozy, Johannes Gilger
Bringing A Cannon To A Knife Fight
2015-08-06CrowdStrikeAdam Kozy, Johannes Gilger
Bringing A Cannon To A Knife Fight
2015-06-01CrowdStrikeAdam Kozy
Rhetoric Foreshadows Cyber Activity in the South China Sea
APT23
2015-04-13CrowdStrikeDmitri Alperovitch
Cyber Deterrence in Action? A story of one long HURRICANE PANDA campaign
HURRICANE PANDA
2015-04-13CrowdStrikeDmitri Alperovitch
Cyber Deterrence in Action? A story of one long HURRICANE PANDA campaign
HURRICANE PANDA
2015-02-23CrowdStrikeAdam Kozy
Cyber Kung-Fu: The Great Firewall Art of DNS Poisoning
2015-02-10CrowdStrikeCrowdStrike
Global Threat Intel Report
MAGNETIC SPIDER PALE PANDA PREDATOR PANDA SABRE PANDA SPICY PANDA WET PANDA
2015-02-06CrowdStrikeCrowdStrike
CrowdStrike Global Threat Intel Report 2014
BlackPOS CryptoLocker Derusbi Elise Enfal EvilGrab Gameover P2P HttpBrowser Medusa Mirage Naikon NetTraveler pirpi PlugX Poison Ivy Sakula RAT Sinowal sykipot taidoor
2015-01-26CrowdStrikeAndy Schworer, Josh Liburdi
Storm Chasing: Hunting Hurricane Panda
HURRICANE PANDA
2015-01-26CrowdStrikeAndy Schworer, Josh Liburdi
Storm Chasing: Hunting Hurricane Panda
HURRICANE PANDA
2014-11-24CrowdStrikeMatt Dahl
I am Ironman: DEEP PANDA Uses Sakula Malware to Target Organizations in Multiple Sectors
APT19
2014-10-14CrowdStrikeDmitri Alperovitch
CrowdStrike Discovers Use of 64-bit Zero-Day Privilege Escalation Exploit (CVE-2014-4113) by Hurricane Panda
HURRICANE PANDA