Click here to download all references as Bib-File.

Enter keywords to filter the library entries below or Propose new Entry
2021-02Dancho Danchev's BlogDancho Danchev's Blog
@online{blog:202102:profiling:e0aafb8, author = {Dancho Danchev's Blog}, title = {{Profiling a Currently Active High-Profile Cybercriminals Portfolio of Ransomware-Themed Extortion Email Addresses - Part Two}}, date = {2021-02}, organization = {Dancho Danchev's Blog}, url = {https://ddanchev.blogspot.com/2021/02/profiling-currently-active-high-profile.html}, language = {English}, urldate = {2021-02-20} } Profiling a Currently Active High-Profile Cybercriminals Portfolio of Ransomware-Themed Extortion Email Addresses - Part Two
2012-09-28Dancho Danchev's BlogDancho Danchev
@online{danchev:20120928:dissecting:1ee1a3f, author = {Dancho Danchev}, title = {{Dissecting 'Operation Ababil' - an OSINT Analysis}}, date = {2012-09-28}, organization = {Dancho Danchev's Blog}, url = {http://ddanchev.blogspot.com.es/2012/09/dissecting-operation-ababil-osint.html}, language = {English}, urldate = {2020-01-10} } Dissecting 'Operation Ababil' - an OSINT Analysis
Cyber fighters of Izz Ad-Din Al Qassam
2008-06-10ZDNetDancho Danchev
@online{danchev:20080610:whos:504e579, author = {Dancho Danchev}, title = {{Who's behind the GPcode ransomware?}}, date = {2008-06-10}, organization = {ZDNet}, url = {http://www.zdnet.com/article/whos-behind-the-gpcode-ransomware/}, language = {English}, urldate = {2019-12-18} } Who's behind the GPcode ransomware?