Click here to download all references as Bib-File.

Enter keywords to filter the library entries below or Propose new Entry
2020-08-03KELASharon Bitton, Victoria Kivilevich
@online{bitton:20200803:httpskelacombacktoschoolwhycybercriminalscontinuetotargettheeducationsector:c7312d4, author = {Sharon Bitton and Victoria Kivilevich}, title = {{https://ke-la.com/back-to-school-why-cybercriminals-continue-to-target-the-education-sector/}}, date = {2020-08-03}, organization = {KELA}, url = {https://ke-la.com/back-to-school-why-cybercriminals-continue-to-target-the-education-sector/}, language = {English}, urldate = {2021-05-07} } https://ke-la.com/back-to-school-why-cybercriminals-continue-to-target-the-education-sector/
2020-07-22KELARaveed Laeb
@online{laeb:20200722:slacking:8cb7d81, author = {Raveed Laeb}, title = {{Slacking Off – Slack and the Corporate Attack Surface Landscape}}, date = {2020-07-22}, organization = {KELA}, url = {https://ke-la.com/slacking-off-slack-and-the-corporate-attack-surface-landscape/}, language = {English}, urldate = {2021-05-07} } Slacking Off – Slack and the Corporate Attack Surface Landscape
2020-06-08KELARaveed Laeb
@online{laeb:20200608:schrodingers:6ebbf4a, author = {Raveed Laeb}, title = {{Schrodinger’s Threat – MagBo Adapts Access Control Policies}}, date = {2020-06-08}, organization = {KELA}, url = {https://ke-la.com/schrodingers-threat-magbo-adapts-access-control-policies/}, language = {English}, urldate = {2021-05-07} } Schrodinger’s Threat – MagBo Adapts Access Control Policies
2020-05-30KELAVictoria Kivilevich, Sharon Bitton
@online{kivilevich:20200530:exposing:638865b, author = {Victoria Kivilevich and Sharon Bitton}, title = {{Exposing the UAE’s Underground Digital Dangers: The Attack Surface of One of the Most Digitally Advanced Countries in the Arab World}}, date = {2020-05-30}, organization = {KELA}, url = {https://ke-la.com/exposing-the-uaes-underground-digital-dangers-the-attack-surface-of-one-of-the-most-digitally-advanced-countries-in-the-arab-world/}, language = {English}, urldate = {2021-06-09} } Exposing the UAE’s Underground Digital Dangers: The Attack Surface of One of the Most Digitally Advanced Countries in the Arab World
2020-05-13KELARaveed Laeb
@online{laeb:20200513:accessasaservice:caaac1b, author = {Raveed Laeb}, title = {{Access-as-a-Service – Remote Access Markets in the Cybercrime Underground}}, date = {2020-05-13}, organization = {KELA}, url = {https://ke-la.com/access-as-a-service-remote-access-markets-in-the-cybercrime-underground/}, language = {English}, urldate = {2021-05-07} } Access-as-a-Service – Remote Access Markets in the Cybercrime Underground
2020-05-10KELANoy Reuveni
@online{reuveni:20200510:duties:b07dce3, author = {Noy Reuveni}, title = {{The Duties Beyond Assisting the Public: Darknet Threats Against Canadian Health & Support Organizations}}, date = {2020-05-10}, organization = {KELA}, url = {https://ke-la.com/duties-beyond-assisting-the-public/}, language = {English}, urldate = {2021-05-07} } The Duties Beyond Assisting the Public: Darknet Threats Against Canadian Health & Support Organizations
2020-02-26KELALeon Kurolapnik, Raveed Laeb
@online{kurolapnik:20200226:whats:930c58d, author = {Leon Kurolapnik and Raveed Laeb}, title = {{What’s Dead May Never Die: AZORult Infostealer Decommissioned Again}}, date = {2020-02-26}, organization = {KELA}, url = {https://ke-la.com/whats-dead-may-never-die-azorult-infostealer-decommissioned-again/}, language = {English}, urldate = {2021-05-07} } What’s Dead May Never Die: AZORult Infostealer Decommissioned Again
Azorult
2020-02-21KELARaveed Laeb
@online{laeb:20200221:exploring:179689d, author = {Raveed Laeb}, title = {{Exploring the Genesis Supply Chain for Fun and Profit: Part 1 – Misadventures in GUIDology}}, date = {2020-02-21}, organization = {KELA}, url = {https://ke-la.com/exploring-the-genesis-supply-chain-for-fun-and-profit/}, language = {English}, urldate = {2020-02-26} } Exploring the Genesis Supply Chain for Fun and Profit: Part 1 – Misadventures in GUIDology
Azorult
2020-02-19KELAKELA’s Research Team
@online{team:20200219:uncovering:a27e717, author = {KELA’s Research Team}, title = {{Uncovering the Anonymity Cloak}}, date = {2020-02-19}, organization = {KELA}, url = {https://ke-la.com/uncovering-the-anonymity-cloak/}, language = {English}, urldate = {2021-05-08} } Uncovering the Anonymity Cloak
2020-01-26KELARaveed Laeb
@online{laeb:20200126:one:cf0bb50, author = {Raveed Laeb}, title = {{One Attacker’s Trash is Another Attacker’s Treasure: A New Ecosystem Drives Cybercrime Innovation}}, date = {2020-01-26}, organization = {KELA}, url = {https://ke-la.com/one-attackers-trash-is-another-attackers-treasure/}, language = {English}, urldate = {2021-05-08} } One Attacker’s Trash is Another Attacker’s Treasure: A New Ecosystem Drives Cybercrime Innovation