Click here to download all references as Bib-File.•
2024-01-16
⋅
NOZOMI Network Labs
⋅
P2PInfect Worm Evolves to Target a New Platform P2Pinfect |
2022-12-15
⋅
NOZOMI Network Labs
⋅
Tracking Malicious Glupteba Activity Through the Blockchain Glupteba |
2022-11-02
⋅
NOZOMI Network Labs
⋅
Could Threat Actors Be Downgrading Their Malware to Evade Detection? Bashlite |
2022-04-27
⋅
Nozomi Networks
⋅
Industroyer2: Nozomi Networks Labs Analyzes the IEC 104 Payload INDUSTROYER2 |
2022-04-18
⋅
Nozomi Networks
⋅
New BotenaGo Variant Discovered by Nozomi Networks Labs BotenaGo |
2022-03-01
⋅
Nozomi Networks
⋅
How IoT Botnets Evade Detection and Analysis Mozi SBIDIOT |
2022-01-25
⋅
Nozomi Networks
⋅
How to Analyze Malware for Technical Writing DarkSide |
2021-09-21
⋅
Nozomi Networks
⋅
BlackMatter Ransomware Technical Analysis and Tools from Nozomi Networks Labs BlackMatter |
2021-06-22
⋅
Nozomi Networks
⋅
How to Dissect Unusual Protocols for Troubleshooting OT Security |
2021-05-19
⋅
Nozomi Networks
⋅
Colonial Pipeline Ransomware Attack: Revealing How DarkSide Works DarkSide |
2021-04-07
⋅
Nozomi Networks
⋅
Threat Intelligence: Analysis of the SBIDIOT IoT Malware SBIDIOT |
2020-10-13
⋅
Nozomi Networks
⋅
Overcoming the Challenges of Detecting P2P Botnets on Your Network Mozi |
2019-02-12
⋅
Nozomi Networks
⋅
GreyEnergy Malware Research Paper: Maldoc to Backdoor GreyEnergy |
2018-08-08
⋅
Nozomi Networks
⋅
TRITON: The First ICS Cyber Attack on Safety Instrument Systems Triton |