Click here to download all references as Bib-File.

Enter keywords to filter the library entries below or Propose new Entry
2018-08-30CrowdStrikeAdam Kozy
@online{kozy:20180830:two:7e5235f, author = {Adam Kozy}, title = {{Two Birds, One STONE PANDA}}, date = {2018-08-30}, organization = {CrowdStrike}, url = {https://www.crowdstrike.com/blog/two-birds-one-stone-panda/}, language = {English}, urldate = {2020-05-11} } Two Birds, One STONE PANDA
2017-12-20CrowdStrikeAdam Kozy
@online{kozy:20171220:end:218a388, author = {Adam Kozy}, title = {{An End to “Smash-and-Grab” and a Move to More Targeted Approaches}}, date = {2017-12-20}, organization = {CrowdStrike}, url = {https://www.crowdstrike.com/blog/an-end-to-smash-and-grab-more-targeted-approaches/}, language = {English}, urldate = {2020-05-11} } An End to “Smash-and-Grab” and a Move to More Targeted Approaches
CHINACHOPPER
2015-12-30CrowdStrikeAdam Kozy, Johannes Gilger
@online{kozy:20151230:bringing:616e8d1, author = {Adam Kozy and Johannes Gilger}, title = {{Bringing A Cannon To A Knife Fight}}, date = {2015-12-30}, organization = {CrowdStrike}, url = {https://www.youtube.com/watch?v=wewFYh8pQrY}, language = {English}, urldate = {2020-05-11} } Bringing A Cannon To A Knife Fight
2015-08-06CrowdStrikeAdam Kozy, Johannes Gilger
@techreport{kozy:20150806:bringing:a7978d5, author = {Adam Kozy and Johannes Gilger}, title = {{Bringing A Cannon To A Knife Fight}}, date = {2015-08-06}, institution = {CrowdStrike}, url = {https://www.blackhat.com/docs/us-15/materials/us-15-Kozy-Bringing-A-Cannon-To-A-Knife-Fight.pdf}, language = {English}, urldate = {2020-05-11} } Bringing A Cannon To A Knife Fight
2015-06-01CrowdStrikeAdam Kozy
@online{kozy:20150601:rhetoric:365c0d1, author = {Adam Kozy}, title = {{Rhetoric Foreshadows Cyber Activity in the South China Sea}}, date = {2015-06-01}, organization = {CrowdStrike}, url = {http://www.crowdstrike.com/blog/rhetoric-foreshadows-cyber-activity-in-the-south-china-sea/}, language = {English}, urldate = {2019-12-20} } Rhetoric Foreshadows Cyber Activity in the South China Sea
Lotus Panda Pirate Panda
2015-02-23CrowdStrikeAdam Kozy
@online{kozy:20150223:cyber:d6b26b8, author = {Adam Kozy}, title = {{Cyber Kung-Fu: The Great Firewall Art of DNS Poisoning}}, date = {2015-02-23}, organization = {CrowdStrike}, url = {https://www.crowdstrike.com/blog/cyber-kung-fu-great-firewall-art-dns-poisoning/}, language = {English}, urldate = {2020-05-11} } Cyber Kung-Fu: The Great Firewall Art of DNS Poisoning
2014-10-02CrowdStrikeAdam Kozy
@online{kozy:20141002:occupy:bda8f35, author = {Adam Kozy}, title = {{Occupy Central: The Umbrella Revolution and Chinese Intelligence}}, date = {2014-10-02}, organization = {CrowdStrike}, url = {https://www.crowdstrike.com/blog/occupy-central-the-umbrella-revolution-and-chinese-intelligence/}, language = {English}, urldate = {2020-05-11} } Occupy Central: The Umbrella Revolution and Chinese Intelligence