Click here to download all references as Bib-File.

Enter keywords to filter the library entries below or Propose new Entry
2020-11-12DragosDragos
Cyber Threat Perspective MANUFACTURING SECTOR
Industroyer Snake
2020-06-18DragosJoe Slowik
EKANS Ransomware Misconceptions and Misunderstandings
Snake
2020-03-01DragosJoe Slowik
Spyware Stealer Locker Wiper Locker Goga Revisited
LockerGoga
2020-02-24DragosDragos
2019 Year In Review: The ICS Landscape and Threat Actviity Groups
Fox Kitten
2020-02-03DragosDragos
EKANS Ransomware and ICS Operations
Snake
2020-01-09DragosDragos
PARISITE
Fox Kitten
2020-01-01DragosDragos
North American Electric Cyber Threat Perspective
Fox Kitten
2020-01-01DragosJoe Slowik
Threat Intelligence and the Limits of Malware Analysis
Exaramel Exaramel Industroyer Lookback NjRAT PlugX
2019-08-01DragosDragos
Global Oil and Gas Cyber Threat Perspective
2019-04-03DragosDragos
Allanite
ALLANITE
2019-01-01DragosDragos
Adversary Reports
ALLANITE APT33 CHRYSENE ENERGETIC BEAR Lazarus Group Sandworm
2018-08-02DragosDragos
Raspite
RASPITE
2018-03-01DragosDragos
INDUSTRIAL CONTROL SYSTEM THREATS
APT33 CHRYSENE ENERGETIC BEAR Lazarus Group Sandworm
2017-12-13DragosDragos
TRISIS Malware: Analysis of Safety System Targeted Malware
Triton
2017-12-01DragosRobert M. Lee
TRISIS: Analyzing Safety System Targeting Malware
TEMP.Veles
2017-06-13DragosDragos
CRASHOVERRIDE Analysis of the Threat to Electric Grid Operations
ENERGETIC BEAR
2017-06-13DragosDragos
CRASHOVERRIDE: Analysis of the Threatto Electric Grid Operations
Industroyer Sandworm
2017-01-01DragosDragos
XENOTIME
TEMP.Veles