Click here to download all references as Bib-File.

Enter keywords to filter the library entries below or Propose new Entry
2018-09-27Palo Alto Networks Unit 42Bryan Lee, Josh Grunzweig
New KONNI Malware attacking Eurasia and Southeast Asia
Nokki
2018-08-02Palo Alto Networks Unit 42David Fuertes, Josh Grunzweig, Kyle Wilhoit, Robert Falcone
The Gorgon Group: Slithering Between Nation State and Cybercrime
Loki Password Stealer (PWS) Nanocore RAT NjRAT Quasar RAT Remcos Revenge RAT
2018-08-02David Fuertes, Josh Grunzweig, Kyle Wilhoit, Robert Falcone
The Gorgon Group: Slithering Between Nation State and Cybercrime
The Gorgon Group
2018-06-26Palo Alto Networks Unit 42Brittany Ash, Josh Grunzweig, Tom Lancaster
RANCOR: Targeted Attacks in South East Asia Using PLAINTEE and DDKONG Malware Families
DDKONG PLAINTEE
2018-06-26Palo Alto Networks Unit 42Brittany Ash, Josh Grunzweig, Tom Lancaster
RANCOR: Targeted Attacks in South East Asia Using PLAINTEE and DDKONG Malware Families
RANCOR
2018-06-18Department of JusticeDepartment of Justice
Joshua Adam Schulte Charged with the Unauthorized Disclosure of Classified Information and Other Offenses Relating to the Theft of Classified Material from the Central Intelligence Agency
[Vault 7/8]
2018-04-17Palo Alto Networks Unit 42Brandon Levene, Josh Grunzweig, Kyle Wilhoit, Pat Litke
SquirtDanger: The Swiss Army Knife Malware from Veteran Malware Author TheBottle
SquirtDanger
2018-03-13PhishLabsJoshua Shilko
New Variant of BankBot Banking Trojan Ups Ante, Cashes Out on Android Users
Anubis
2018-03-07Palo Alto Networks Unit 42Brandon Levene, Brittany Ash, Josh Grunzweig
Patchwork Continues to Deliver BADNEWS to the Indian Subcontinent
BadNews
2018-03-05Palo Alto Networks Unit 42Brandon Levene, Josh Grunzweig
Sure, I’ll take that! New ComboJack Malware Alters Clipboards to Steal Cryptocurrency
Combojack
2018-01-26Palo Alto Networks Unit 42Josh Grunzweig
The TopHat Campaign: Attacks Within The Middle East Region Using Popular Third-Party Services
Scote
2018-01-01AccentureAlireza Salimi, Benjamin G. McCarthy, Joshua Ray
Monero and WannaMine: The cyber-criminal cryptocurrency and miner malware of choice
WannaMine
2018-01-01AccentureBart Parys, Joshua Ray
Dragonfish delivers New Form of Elise Malware targeting ASEAN Defence Ministers' Meeting and Associates
Elise LOTUS PANDA
2018-01-01Accenture SecurityGareth Russell, Joshua Ray, Kelly Bissell, Ryan LaSalle, Uwe Kissman
LATEST CYBER ESPIONAGE MALWARE ATTACKS
LOTUS PANDA
2017-11-10Palo Alto Networks Unit 42Jen Miller-Osborn, Josh Grunzweig
New Malware with Ties to SunOrcal Discovered
Reaver SunOrcal
2017-11-02Palo Alto Networks Unit 42Jacob Soo, Josh Grunzweig
Recent InPage Exploits Lead to Multiple Malware Families
Confucius
2017-11-02Palo Alto Networks Unit 42Jacob Soo, Josh Grunzweig
Recent InPage Exploits Lead to Multiple Malware Families
BioData
2017-09-28Palo Alto Networks Unit 42Josh Grunzweig, Robert Falcone
Threat Actors Target Government of Belarus Using CMSTAR Trojan
BYEBY CMSTAR Vicious Panda
2017-09-28Palo Alto Networks Unit 42Josh Grunzweig, Robert Falcone
Threat Actors Target Government of Belarus Using CMSTAR Trojan
BYEBY CMSTAR
2017-04-21The Wall Street JournalJonathan Cheng, Josh Chin
China Hacked South Korea Over Missile Defense, U.S. Firm Says
Tonto Team