Click here to download all references as Bib-File.

Enter keywords to filter the library entries below or Propose new Entry
2015-02-18G DataG Data
Babar: espionage software finally found and put under the microscope
Evilbunny SNOWGLOBE
2015-01-20G DataG Data
Analysis of Project Cobra
Cobra Carbon System
2015-01-15G DataG Data
Weiterentwicklung anspruchsvoller Spyware: von Agent.BTZ zu ComRAT
Agent.BTZ
2014-11-11G DataG Data
The Uroburos case: new sophisticated RAT identified
Agent.BTZ Uroburos
2014-10-31G DataG Data
OPERATION “TOOHASH”: HOW TARGETED ATTACKS WORK
Cohhoc ProjectWood Gelsemium
2014-10-30G DataG Data
COM Object hijacking: the discreet way of persistence
COMpfun
2014-07-31G DataG Data
Poweliks: the persistent malware without a file
Poweliks
2014-06-02G DataG Data
Analysis of Uroburos, using WinDbg
Uroburos
2014-05-13G DataG Data
Uroburos rootkit: Belgian Foreign Ministry stricken
Uroburos
2014-03-07G DataG Data
Uroburos – Deeper travel into kernel protection mitigation
Uroburos
2014-02-28G Data BlogG Data
Uroburos - highly complex espionage software with Russian roots
Uroburos