Click here to download all references as Bib-File.

Enter keywords to filter the library entries below or Propose new Entry
2021-06-29Silverado Policy AcceleratorAnne Neuberger, Dmitri Alperovitch
@online{neuberger:20210629:cyber:dbbba1d, author = {Anne Neuberger and Dmitri Alperovitch}, title = {{Cyber Strategy in the Biden Era: A Conversation with Anne Neuberger}}, date = {2021-06-29}, organization = {Silverado Policy Accelerator}, url = {https://www.youtube.com/watch?v=vm4p1_qDO2M}, language = {English}, urldate = {2021-06-29} } Cyber Strategy in the Biden Era: A Conversation with Anne Neuberger
2021-04-19WAR ON THE ROCKSDmitri Alperovitch, Erica Borghard, Jason Healey, Ryan Evans
@online{alperovitch:20210419:great:4cdaa13, author = {Dmitri Alperovitch and Erica Borghard and Jason Healey and Ryan Evans}, title = {{Great Power Cyber Party}}, date = {2021-04-19}, organization = {WAR ON THE ROCKS}, url = {https://warontherocks.com/2021/04/great-power-cyber-party/}, language = {English}, urldate = {2021-04-29} } Great Power Cyber Party
2016-06-15CrowdStrikeDmitri Alperovitch
@online{alperovitch:20160615:bears:604c1d9, author = {Dmitri Alperovitch}, title = {{Bears in the Midst: Intrusion into the Democratic National Committee}}, date = {2016-06-15}, organization = {CrowdStrike}, url = {https://www.crowdstrike.com/blog/bears-midst-intrusion-democratic-national-committee/}, language = {English}, urldate = {2022-03-14} } Bears in the Midst: Intrusion into the Democratic National Committee
X-Agent ATI-Agent SEADADDY Seduploader X-Agent XTunnel APT28
2015-04-13CrowdStrikeDmitri Alperovitch
@online{alperovitch:20150413:cyber:93796f8, author = {Dmitri Alperovitch}, title = {{Cyber Deterrence in Action? A story of one long HURRICANE PANDA campaign}}, date = {2015-04-13}, organization = {CrowdStrike}, url = {http://www.crowdstrike.com/blog/cyber-deterrence-in-action-a-story-of-one-long-hurricane-panda-campaign/}, language = {English}, urldate = {2019-12-20} } Cyber Deterrence in Action? A story of one long HURRICANE PANDA campaign
HURRICANE PANDA
2015-04-13CrowdStrikeDmitri Alperovitch
@online{alperovitch:20150413:cyber:9cee61c, author = {Dmitri Alperovitch}, title = {{Cyber Deterrence in Action? A story of one long HURRICANE PANDA campaign}}, date = {2015-04-13}, organization = {CrowdStrike}, url = {https://www.crowdstrike.com/blog/cyber-deterrence-in-action-a-story-of-one-long-hurricane-panda-campaign/}, language = {English}, urldate = {2020-06-03} } Cyber Deterrence in Action? A story of one long HURRICANE PANDA campaign
HURRICANE PANDA
2014-10-14CrowdStrikeDmitri Alperovitch
@online{alperovitch:20141014:crowdstrike:9be6684, author = {Dmitri Alperovitch}, title = {{CrowdStrike Discovers Use of 64-bit Zero-Day Privilege Escalation Exploit (CVE-2014-4113) by Hurricane Panda}}, date = {2014-10-14}, organization = {CrowdStrike}, url = {https://www.crowdstrike.com/blog/crowdstrike-discovers-use-64-bit-zero-day-privilege-escalation-exploit-cve-2014-4113-hurricane-panda/}, language = {English}, urldate = {2020-06-03} } CrowdStrike Discovers Use of 64-bit Zero-Day Privilege Escalation Exploit (CVE-2014-4113) by Hurricane Panda
HURRICANE PANDA
2014-07-07CrowdStrikeDmitri Alperovitch
@online{alperovitch:20140707:deep:63e59f7, author = {Dmitri Alperovitch}, title = {{Deep in Thought: Chinese Targeting of National Security Think Tanks}}, date = {2014-07-07}, organization = {CrowdStrike}, url = {https://www.crowdstrike.com/blog/deep-thought-chinese-targeting-national-security-think-tanks/}, language = {English}, urldate = {2019-12-20} } Deep in Thought: Chinese Targeting of National Security Think Tanks
APT19
2014-02-24RSA ConferenceDmitri Alperovitch
@techreport{alperovitch:20140224:art:df5650c, author = {Dmitri Alperovitch}, title = {{The Art of Attribution Identifying and Pursuing your Cyber Adversaries}}, date = {2014-02-24}, institution = {RSA Conference}, url = {https://docs.huihoo.com/rsaconference/usa-2014/anf-t07b-the-art-of-attribution-identifying-and-pursuing-your-cyber-adversaries-final.pdf}, language = {English}, urldate = {2020-04-06} } The Art of Attribution Identifying and Pursuing your Cyber Adversaries
ANDROMEDA SPIDER APT19 DEXTOROUS SPIDER Ghost Jackal Silent Chollima SINGING SPIDER Tonto Team TOXIC PANDA UNION SPIDER