Click here to download all references as Bib-File.

Enter keywords to filter the library entries below or Propose new Entry
2015-12-22Bryan Lee, Josh Grunzweig
BBSRAT Attacks Targeting Russian Organizations Linked to Roaming Tiger
Roaming Tiger
2015-10-09Palo Alto Networks Unit 42Josh Grunzweig
Latest TeslaCrypt Ransomware Borrows Code From Carberp Trojan
TeslaCrypt
2015-08-20Palo Alto Networks Unit 42Brandon Levene, Bryan Lee, Josh Grunzweig, Robert Falcone, Ryan Olson
Retefe Banking Trojan Targets Sweden, Switzerland and Japan
Retefe
2015-07-20paloalto Networks Unit 42Bryan Lee, Josh Grunzweig
Watering Hole Attack on Aerospace Firm Exploits CVE-2015-5122 to Install IsSpace Backdoor
IsSpace
2015-04-14Palo Alto Networks Unit 42Jen Miller-Osborn, Josh Grunzweig
Unit 42 Identifies New DragonOK Backdoor Malware Deployed Against Japanese Targets
DragonOK
2015-04-14Palo Alto Networks Unit 42Jen Miller-Osborn, Josh Grunzweig
Unit 42 Identifies New DragonOK Backdoor Malware Deployed Against Japanese Targets
FormerFirstRAT
2015-03-19Palo Alto Networks Unit 42Josh Grunzweig
FindPOS: New POS Malware Family Discovered
FindPOS
2014-07-15Palo Alto Networks Unit 42Josh Grunzweig
Unit 42 Technical Analysis: Seaduke
SEADADDY
2013-12-09TrustwaveJosh Grunzweig
The Curious Case of the Malicious IIS Module
IISniff
2013-06-03TrustwaveJosh Grunzweig
Alina: Following The Shadow Part 2
Alina POS
2013-05-17TrustwaveJosh Grunzweig
Alina: Following The Shadow Part 1
Alina POS
2013-05-08SpiderLabs BlogJosh Grunzweig
Alina: Casting a Shadow on POS
Alina POS
2012-12-13SpiderLabs BlogJosh Grunzweig
The Dexter Malware: Getting Your Hands Dirty