Click here to download all references as Bib-File.

Enter keywords to filter the library entries below or Propose new Entry
2015-08-27CitizenLabJohn Scott-Railton, Katie Kleemola
@online{scottrailton:20150827:london:d3ff105, author = {John Scott-Railton and Katie Kleemola}, title = {{London Calling: Two-Factor Authentication Phishing From Iran}}, date = {2015-08-27}, organization = {CitizenLab}, url = {https://citizenlab.ca/2015/08/iran_two_factor_phishing/}, language = {English}, urldate = {2020-04-06} } London Calling: Two-Factor Authentication Phishing From Iran
Rocket Kitten
2013-08-02CitizenLabKatie Kleemola, Seth Hardy
@online{kleemola:20130802:surtr:a1bc558, author = {Katie Kleemola and Seth Hardy}, title = {{Surtr Malware Family Targeting the Tibetan Community}}, date = {2013-08-02}, organization = {CitizenLab}, url = {https://citizenlab.ca/2013/08/surtr-malware-family-targeting-the-tibetan-community/}, language = {English}, urldate = {2021-01-29} } Surtr Malware Family Targeting the Tibetan Community
surtr
2010-04-06CitizenLabCitizenLab, Information Warfare Monitor, Shadowserver Foundation
@techreport{citizenlab:20100406:shadows:0ddd0ca, author = {CitizenLab and Information Warfare Monitor and Shadowserver Foundation}, title = {{SHADOWS IN THE CLOUD: Investigating Cyber Espionage 2.0}}, date = {2010-04-06}, institution = {CitizenLab}, url = {https://citizenlab.ca/wp-content/uploads/2017/05/shadows-in-the-cloud.pdf}, language = {English}, urldate = {2020-01-13} } SHADOWS IN THE CLOUD: Investigating Cyber Espionage 2.0
Shadow Network