Click here to download all references as Bib-File.

Enter keywords to filter the library entries below or Propose new Entry
2019-01-17SANS ISC InfoSec ForumsBrad Duncan
Emotet infections and follow-up malware
Emotet
2018-10-01SANS Cyber SummitAndrea Carcano
TRITON: How it Disrupted Safety Systems and Changed the Threat Landscape of Industrial Control Systems, Forever
Triton
2018-01-17SANS ISCbrad
Reviewing the spam filters: Malspam pushing Gozi-ISFB
ISFB
2017-06-27SANSBrad Duncan
Checking out the new Petya variant
EternalPetya
2017-06-22SANS Institute Information Security Reading RoomRob Pantazopoulos
Loki-Bot: InformationStealer, Keylogger, &More!
Loki Password Stealer (PWS)
2017-01-31SANS ISC InfoSec ForumsJohannes
Malicious Office files using fileless UAC bypass to drop KEYBASE malware
KeyBase
2017-01-21SANS ISC InfoSec ForumsBrad Duncan
Sage 2.0 Ransomware
SAGE
2016-03-04SANSDavid Martin
Tracing the Lineage of DarkSeoul
httpdropper
2016-01-22SANSNell Nelson
The Impact of Dragonfly Malware on Industrial Control Systems
ENERGETIC BEAR
2015-12-30SANSMichael J. Assante
Current Reporting on the Cyber Attack in Ukraine Resulting in Power Outage
Sandworm
2012-04-16SANSRong Hwa Chong
Detailed Analysis Of Sykipot (Smartcard Proxy Variant)
APT4
2011-10-14SANSFrankie Fu Kay Li
A Detailed Analysis of an Advanced Persistent Threat Malware
ProjectWood
2010-06-15SANSHarshit Nayyar
Clash of the Titans: ZeuS v SpyEye
SpyEye
2010-05-27SANS ISC InfoSec ForumsKevin Liston
Sasfis Propagation
Sasfis
2004-04-15SANS GIACMatt Goldencrown
MyDoom is Your Doom: An Analysis of the MyDoom Virus
MyDoom