Click here to download all references as Bib-File.

Enter keywords to filter the library entries below or Propose new Entry
2021-09-21Nozomi NetworksNozomi Networks Labs
@online{labs:20210921:blackmatter:61b1b27, author = {Nozomi Networks Labs}, title = {{BlackMatter Ransomware Technical Analysis and Tools from Nozomi Networks Labs}}, date = {2021-09-21}, organization = {Nozomi Networks}, url = {https://www.nozominetworks.com/blog/blackmatter-ransomware-technical-analysis-and-tools-from-nozomi-networks-labs/}, language = {English}, urldate = {2021-09-24} } BlackMatter Ransomware Technical Analysis and Tools from Nozomi Networks Labs
BlackMatter
2021-06-22Nozomi NetworksYounes Dragoni
@online{dragoni:20210622:how:9ecf77e, author = {Younes Dragoni}, title = {{How to Dissect Unusual Protocols for Troubleshooting OT Security}}, date = {2021-06-22}, organization = {Nozomi Networks}, url = {https://www.nozominetworks.com/blog/how-to-dissect-unusual-protocols-for-troubleshooting-ot-security/}, language = {English}, urldate = {2021-09-24} } How to Dissect Unusual Protocols for Troubleshooting OT Security
2021-05-19Nozomi NetworksAlexey Kleymenov
@online{kleymenov:20210519:colonial:e537383, author = {Alexey Kleymenov}, title = {{Colonial Pipeline Ransomware Attack: Revealing How DarkSide Works}}, date = {2021-05-19}, organization = {Nozomi Networks}, url = {https://www.nozominetworks.com/blog/colonial-pipeline-ransomware-attack-revealing-how-darkside-works/}, language = {English}, urldate = {2021-05-26} } Colonial Pipeline Ransomware Attack: Revealing How DarkSide Works
DarkSide
2021-04-07Nozomi NetworksNozomi Networks Labs
@online{labs:20210407:threat:d965e73, author = {Nozomi Networks Labs}, title = {{Threat Intelligence: Analysis of the SBIDIOT IoT Malware}}, date = {2021-04-07}, organization = {Nozomi Networks}, url = {https://www.nozominetworks.com/blog/threat-intelligence-analysis-of-the-sbidiot-iot-malware/}, language = {English}, urldate = {2021-10-24} } Threat Intelligence: Analysis of the SBIDIOT IoT Malware
SBIDIOT
2020-10-13Nozomi NetworksAlessandro Di Pinto
@online{pinto:20201013:overcoming:91cef54, author = {Alessandro Di Pinto}, title = {{Overcoming the Challenges of Detecting P2P Botnets on Your Network}}, date = {2020-10-13}, organization = {Nozomi Networks}, url = {https://www.nozominetworks.com/blog/overcoming-the-challenges-of-detecting-p2p-botnets-on-your-network/}, language = {English}, urldate = {2021-09-28} } Overcoming the Challenges of Detecting P2P Botnets on Your Network
Mozi
2019-02-12Nozomi NetworksAlessandro Di Pinto
@online{pinto:20190212:greyenergy:1acfcdf, author = {Alessandro Di Pinto}, title = {{GreyEnergy Malware Research Paper: Maldoc to Backdoor}}, date = {2019-02-12}, organization = {Nozomi Networks}, url = {https://www.nozominetworks.com/2019/02/12/blog/greyenergy-malware-research-paper-maldoc-to-backdoor/}, language = {English}, urldate = {2020-01-10} } GreyEnergy Malware Research Paper: Maldoc to Backdoor
GreyEnergy
2018-08-08Nozomi NetworksAlessandro Di Pinto, Younes Dragoni, Andrea Carcano
@techreport{pinto:20180808:triton:7c9e25d, author = {Alessandro Di Pinto and Younes Dragoni and Andrea Carcano}, title = {{TRITON: The First ICS Cyber Attack on Safety Instrument Systems}}, date = {2018-08-08}, institution = {Nozomi Networks}, url = {https://www.nozominetworks.com//downloads/US/Nozomi-Networks-TRITON-The-First-SIS-Cyberattack.pdf}, language = {English}, urldate = {2021-09-24} } TRITON: The First ICS Cyber Attack on Safety Instrument Systems
Triton