Click here to download all references as Bib-File.

Enter keywords to filter the library entries below or Propose new Entry
2017-08-31ZscalerAbhay Yadav, Atinderpal Singh, Deepen Desai
Cobian RAT - A backdoored RAT
Cobian RAT
2016-12-01ZscalerEd Miles
CNACOM - Open Source Exploitation via Strategic Web Compromise
2016-09-16ZscalerAtinderpal Singh
iSpy Keylogger
iSpy Keylogger
2016-08-10ZscalerViral Gandhi
Android Marcher: Continuously Evolving Mobile Malware
Marcher
2016-08-01ZscalerDeepen Desai
Agent Tesla Keylogger delivered using cybersquatting
Agent Tesla
2016-01-29ZscalerNirmal Singh
Malicious Office Files Dropping Kasidet And Dridex
Neutrino
2015-03-11ZscalerChris Mannon
Malvertising Targeting European Transit Users
Poweliks
2015-01-22ZscalerDeepen Desai
Malvertising Leading To Flash Zero Day Via Angler Exploit Kit
Bedep
2015-01-09ZscalerZscaler
Chanitor Downloader Actively Installing Vawtrak
Hancitor
2013-09-18ZscalerChris Mannon, Sachin Deodhar
A New Wave Of WIN32/CAPHAW Attacks - A ThreatLabZ Analysis
Shylock
2010-11-10ZscalerThreatLabZ research team
Lethic Botnet Returns, Uses "Realtek" Identifier
Lethic