Click here to download all references as Bib-File.

Enter keywords to filter the library entries below or Propose new Entry
2025-07-23Cato NetworksVitaly Simonovich
Cato CTRL™ Threat Research: Analyzing LAMEHUG – First Known LLM-Powered Malware with Links to APT28 (Fancy Bear)
LAMEHUG
2025-03-11Cato NetworksMatan Mittleman, Ofek Vardi
Cato CTRL Threat Research: Ballista – New IoT Botnet Targeting Thousands of TP-Link Archer Routers
Ballista
2022-03-01Cato NetworksElad Menahem
The DGA Algorithm Used by Dealply and Bujo Campaigns
DealPly