Click here to download all references as Bib-File.

Enter keywords to filter the library entries below or Propose new Entry
2019-01-29FireEyeAndrew Thompson, Ben Read, Cristiana Brafman-Kittner, Nalani Fraser, Sanaz Yashar, Sarah Hawley, Yuri Rozhansky
APT39: An Iranian Cyber Espionage Group Focused on Personal Information
APT39
2019-01-10FireEyeBen Read, Muks Hirani, Sarah Jones
Global DNS Hijacking Campaign: DNS Record Manipulation at Scale
DNSpionage DNSpionage
2019-01-09MandiantBen Read, Muks Hirani, Sarah Jones
Global DNS Hijacking Campaign: DNS Record Manipulation at Scale
DNSpionage Sea Turtle
2018-10-03Virus BulletinMasarah Paquet-Clouston, Olivier Bilodeau
Uncovering the Wholesale Industry of Social Media Fraud: From Botnets to Bulk Reseller Panels
Moose
2018-09-18The CitizenlabBahr Abdul Razzak, Bill Marczak, John Scott-Railton, Ron Deibert, Sarah McKune
Hide and Seek: Tracking NSO Group’s Pegasus Spyware to Operations in 45 Countries
Chrysaor
2018-03-09Adam Senft, Bill Marczak, Jakub Dalek, John Scott-Railton, Ron Deibert, Sarah McKune
Sandvine’s PacketLogic Devices Used to Deploy Government Spyware in Turkey and Redirect Egyptian Users to Affiliate Ads?
StrongPity
2017-12-06The Citizen LabBill Marczak, Geoffrey Alexander, John Scott-Railton, Ron Deibert, Sarah McKune
Champing at the Cyberbit Ethiopian Dissidents Targeted with New Commercial Spyware
PC Surveillance System
2016-11-02GoSecureMasarah Paquet-Clouston
Exposing the EGO MARKET: the cybercrime performed by the Linux/Moose botnet
Moose
2016-06-29EmsisoftSarah
Apocalypse: Ransomware which targets companies through insecure RDP
Apocalypse
2016-01-01EmsisoftSarah
Die erste Ransomware in JavaScript: Ransom32
Enrume
2015-06-23ReutersJoseph Menn, Sarah N. Lynch
Exclusive: SEC hunts hackers who stole corporate emails to trade stocks
WOLF SPIDER