Click here to download all references as Bib-File.

Enter keywords to filter the library entries below or Propose new Entry
2019-07-16enSiloChen Erlich
The Avast Abuser: Metamorfo Banking Malware Hides By Abusing Avast Executable
Metamorfo
2018-11-20enSiloBen Hunter
L0RDIX: MULTIPURPOSE ATTACK TOOL
L0rdix
2018-10-25enSiloChen Erlich, Yakov Goldberg
Game of Trojans: Dissecting the #Khalesi Infostealer Malware
KPOT Stealer
2018-10-25enSiloChen Erlich, Yakov Goldberg
Game of Trojans: Dissecting the #Khalesi Infostealer Malware
KPOT Stealer
2018-01-16enSiloAlon Hadar
GlobeImposter Ransomware
GlobeImposter
2015-10-08enSiloYotam Gottesman
MOKER, PART 2: CAPABILITIES
Moker
2015-10-06enSiloYotam Gottesman
MOKER, PART 1: DISSECTING A NEW APT UNDER THE MICROSCOPE
Moker
2015-10-06enSiloYotam Gottesman
MOKER: A NEW APT DISCOVERED WITHIN A SENSITIVE NETWORK
Moker