Click here to download all references as Bib-File.

Enter keywords to filter the library entries below or Propose new Entry
2024-01-16NOZOMI Network LabsNozomi Networks Labs
P2PInfect Worm Evolves to Target a New Platform
P2Pinfect
2022-12-15NOZOMI Network LabsNozomi Networks Labs
Tracking Malicious Glupteba Activity Through the Blockchain
Glupteba
2022-11-02NOZOMI Network LabsNozomi Networks Labs
Could Threat Actors Be Downgrading Their Malware to Evade Detection?
Bashlite
2022-04-27Nozomi NetworksNozomi Networks Labs
Industroyer2: Nozomi Networks Labs Analyzes the IEC 104 Payload
INDUSTROYER2
2022-04-18Nozomi NetworksNozomi Networks Labs
New BotenaGo Variant Discovered by Nozomi Networks Labs
BotenaGo
2022-03-01Nozomi NetworksNozomi Networks Labs
How IoT Botnets Evade Detection and Analysis
Mozi SBIDIOT
2022-01-25Nozomi NetworksAlexey Kleymenov
How to Analyze Malware for Technical Writing
DarkSide
2021-09-21Nozomi NetworksNozomi Networks Labs
BlackMatter Ransomware Technical Analysis and Tools from Nozomi Networks Labs
BlackMatter
2021-06-22Nozomi NetworksYounes Dragoni
How to Dissect Unusual Protocols for Troubleshooting OT Security
2021-05-19Nozomi NetworksAlexey Kleymenov
Colonial Pipeline Ransomware Attack: Revealing How DarkSide Works
DarkSide
2021-04-07Nozomi NetworksNozomi Networks Labs
Threat Intelligence: Analysis of the SBIDIOT IoT Malware
SBIDIOT
2020-10-13Nozomi NetworksAlessandro Di Pinto
Overcoming the Challenges of Detecting P2P Botnets on Your Network
Mozi
2019-02-12Nozomi NetworksAlessandro Di Pinto
GreyEnergy Malware Research Paper: Maldoc to Backdoor
GreyEnergy
2018-08-08Nozomi NetworksAlessandro Di Pinto, Andrea Carcano, Younes Dragoni
TRITON: The First ICS Cyber Attack on Safety Instrument Systems
Triton