Click here to download all references as Bib-File.

Enter keywords to filter the library entries below or Propose new Entry
2020-07-08Trend MicroTrend Micro Threat Research Team
@online{team:20200708:ransomware:90c8636, author = {Trend Micro Threat Research Team}, title = {{Ransomware Report: Avaddon and New Techniques Emerge, Industrial Sector Targeted}}, date = {2020-07-08}, organization = {Trend Micro}, url = {https://www.trendmicro.com/vinfo/us/security/news/cybercrime-and-digital-threats/ransomware-report-avaddon-and-new-techniques-emerge-industrial-sector-targeted}, language = {English}, urldate = {2020-07-30} } Ransomware Report: Avaddon and New Techniques Emerge, Industrial Sector Targeted
Avaddon
2015-02-25Trend MicroTrend Micro Threat Research Team
@techreport{team:20150225:operation:3300d1e, author = {Trend Micro Threat Research Team}, title = {{OPERATION ARID VIPER: Bypassing the Iron Dome}}, date = {2015-02-25}, institution = {Trend Micro}, url = {http://www.trendmicro.com/cloud-content/us/pdfs/security-intelligence/white-papers/wp-operation-arid-viper.pdf}, language = {English}, urldate = {2020-01-09} } OPERATION ARID VIPER: Bypassing the Iron Dome
AridViper
2014Trend MicroTrend Micro Threat Research Team
@online{team:2014:operation:04bda8b, author = {Trend Micro Threat Research Team}, title = {{Operation Arid Viper - Bypassing the Iron Dome}}, date = {2014}, organization = {Trend Micro}, url = {https://securingtomorrow.mcafee.com/other-blogs/mcafee-labs/lazarus-resurfaces-targets-global-banks-bitcoin-users/#atricle-content}, language = {English}, urldate = {2019-10-23} } Operation Arid Viper - Bypassing the Iron Dome
CoreDN