Click here to download all references as Bib-File.

Enter keywords to filter the library entries below or Propose new Entry
2024-10-18ForcepointMayur Sewani
Inside the Latrodectus Malware Campaign Old School Phishing Meets Innovative Payload Delivery
Latrodectus
2021-03-05ForcepointKurt Natvig, Robert Neumann
Advancements in Invoicing - A highly sophisticated way to distribute ZLoader
Zloader
2019-04-30ForcepointRobert Neumann
TinyPOS: An analysis of a Point-Of-Sale malware ecosystem
2018-11-28ForcepointRobert Neumann
AutoCAD Malware - Computer Aided Theft
AutoCAD Downloader
2018-02-08ForcepointLuke Somerville, Robert Neumann
UDPoS - exfiltrating credit card data via DNS
UDPoS
2018-02-06ForcepointJohn Bergbom
DanderSpritz/PeddleCheap traffic analysis (Part 1 of 2)
PeddleCheap
2017-03-29ForcepointRoland Dela Paz
Trojanized Adobe installer used to install DragonOK’s new custom backdoor
KHRAT DragonOK
2017-01-17ForcepointNicholas Griffin
Carbanak Group uses Google for malware command-and-control
GGLdr
2016-10-21ForcepointRolanda Dela Paz
BITTER: a targeted attack against Pakistan
Bitter RAT
2016-09-28ForcepointNicholas Griffin
Highly Evasive Code Injection Awaits User Interaction Before Delivering Malware
BuhTrap
2016-09-22ForcepointNicholas Griffin
Zeus Delivered by DELoader to Defraud Customers of Canadian Banks
Zloader
2016-08-08ForcepointNicholas Griffin
MONSOON - Analysis Of An APT Campaign
BadNews TinyTyphon QUILTED TIGER
2016-08-08ForcepointAbel Toro, Andy Settle, Nicholas Griffin
MONSOON – ANALYSIS OF AN APT CAMPAIGN
BadNews TinyTyphon QUILTED TIGER
2016-01-01ForcepointAbel Toro, Andy Settle, Bapadittya Dey, Nicholas Griffin
Analysis of a Botnet Campaign
Jaku