Semantic search

Jump to navigation Jump to search

Shevchenko, S.. (2008, November 30). Agent.btz - A Threat That Hit Pentagon. Retrieved April 8, 2016.
Shinotsuka, H. (2013, February 22). How Attackers Steal Private Keys from Digital Certificates. Retrieved March 31, 2016.
Smith, C. (2015, August 24). Application Whitelisting Evasion 101 - Trusted Things That Execute Things "InstallUtil.exe". Retrieved June 17, 2016.
Smith, C. (2016, April 19). Bypass Application Whitelisting Script Protections - Regsvr32.exe & COM Scriptlets (.sct files). Retrieved June 22, 2016.
Smith, C. (2015, November 9). All-Natural, Organic, Free Range, Sustainable, Whitelisting Evasion - Regsvcs and RegAsm. Retrieved July 1, 2016.
Spenneberg, Ralf. (2016). PLC-Blaster. Retrieved June 6, 2019.
Spenneberg, Ralf, Maik Brüggemann, and Hendrik Schwartke. (2016, March 31). Plc-blaster: A worm living solely in the plc.. Retrieved September 19, 2017.
Stama, D.. (2015, February 6). Backdoor.Mivast. Retrieved February 15, 2016.
Stephen Hilt, Federico Maggi, Charles Perine, Lord Remorin, Martin Rösler, and Rainer Vosseler. (n.d.). Caught in the Act: Running a Realistic Factory Honeypot to Capture Real Threats. Retrieved April 12, 2021.
Stewart, A. (2014). DLL SIDE-LOADING: A Thorn in the Side of the Anti-Virus Industry. Retrieved November 12, 2014.
Sutherland, S. (2014, September 9). 15 Ways to Bypass the PowerShell Execution Policy. Retrieved July 23, 2015.
Symantec. (2017, July 28). Trojan.Karagany.B. Retrieved September 27, 2017.
Symantec. (2015, June 30). Simple steps to protect yourself from the Conficker Worm. Retrieved December 5, 2019.
Symantec. (2017, December 14). Triton: New Malware Threatens Industrial Safety Systems. Retrieved March 8, 2019.
Symantec. (2017, July 10). Trojan.Listrix. Retrieved September 20, 2017.
Symantec. (2015, January 26). The Waterbug attack group. Retrieved April 10, 2015.
Symantec. (n.d.). Retrieved October 17, 2017.
Symantec. (2018, May 02). Trojan.Trisis. Retrieved March 8, 2019.
Symantec. (n.d.). W32.Duqu The precursor to the next Stuxnet. Retrieved November 3, 2019.
Symantec. (2017, July 31). Trojan.Heriplor. Retrieved September 20, 2017.
Symantec. (2014, June 30). Dragonfly: Western Energy Companies Under Sabotage Threat. Retrieved October 22, 2019.
Symantec. (2019, March 27). Elfin: Relentless Espionage Group Targets Multiple Organizations in Saudi Arabia and U.S.. Retrieved December 2, 2019.
Symantec. (2018, July 25). Leafminer: New Espionage Campaigns Targeting Middle Eastern Regions. Retrieved November 4, 2019.
Symantec. (2017, September 6). Dragonfly: Western energy sector targeted by sophisticated attack group. Retrieved September 14, 2017.
Symantec Security Response. (2015, July 13). “Forkmeiamfamous”: Seaduke, latest weapon in the Duke armory. Retrieved July 22, 2015.
Symantec Security Response. (2017, May 22). WannaCry: Ransomware attacks show strong links to Lazarus group. Retrieved December 9, 2019.
Symantec Security Response. (2014, July 7). Dragonfly: Cyberespionage Attacks Against Energy Suppliers. Retrieved April 8, 2016.
Symantec Security Response. (2011, November). W32.Duqu: The precursor to the next Stuxnet. Retrieved September 17, 2015.
Tang, J. (2015, October 19). New Headaches: How The Pawn Storm Zero-Day Evaded Java’s Click-to-Play Protection. Retrieved December 23, 2015.
Tarakanov, D. (2015, June 22). Games are over: Winnti is now targeting pharmaceutical companies. Retrieved January 14, 2016.
The MITRE Corporation. (n.d.). ATT&CK T1068: Exploitation for Privilege Escalation. Retrieved April 12, 2021.
The MITRE Corporation. (n.d.). ATT&CK T1574: Hijack Execution Flow. Retrieved April 12, 2021.
The MITRE Corporation. (2017, May 31). ATT&CK T1106: Native API. Retrieved April 26, 2021.
The Office of Nuclear Reactor Regulation. (n.d.). Triconex Topical Report 7286-545-1. Retrieved May 30, 2018.
ThreatConnect Inc. and Defense Group Inc. (DGI). (2015, September 23). Project CameraShy: Closing the Aperture on China's Unit 78020. Retrieved December 17, 2015.
ThreatConnect Research Team. (2015, February 27). The Anthem Hack: All Roads Lead to China. Retrieved January 26, 2016.
Tilbury, C. (2014, August 28). Registry Analysis with CrowdResponse. Retrieved November 12, 2014.
Tinaztepe, E. (n.d.). The Adventures of a Keystroke: An in-depth look into keyloggers on Windows. Retrieved April 27, 2016.
Tivadar, M., et al. (2013). A Closer Look at MiniDuke. Retrieved April 15, 2016.
Tom Fakterman. (2019, August 05). Sodinokibi: The Crown Prince of Ransomware. Retrieved April 12, 2021.
Tomonaga, S. (2016, January 26). Windows Commands Abused by Attackers. Retrieved February 2, 2016.
Trend Micro. (2016, April 27). Malware Discovered in German Nuclear Power Plant. Retrieved October 14, 2019.
Trend Micro. (2012). The Taidoor Campaign. Retrieved November 12, 2014.
TrueSec. (n.d.). gsecdump v2.0b5. Retrieved September 29, 2015.
Trusted Computing Group. (2008, April 29). Trusted Platform Module (TPM) Summary. Retrieved June 8, 2016.
Twi1ight. (2015, July 11). AD-Pentest-Script - wmiexec.vbs. Retrieved October 2, 2017.
Tyson Macaulay. (n.d.). RIoT Control: Understanding and Managing Risks and the Internet of Things. Retrieved November 4, 2019.
UACME Project. (2016, June 16). UACMe. Retrieved July 26, 2016.
UEFI Forum. (n.d.). About UEFI Forum. Retrieved January 5, 2016.
UNITED STATES DISTRICT COURT WESTERN DISTRICT OF PENNSYLVANIA. (2020, October 15). Indictment: Conspiracy to Commit an Offense Against the United States. Retrieved April 7, 2021.
US-CERT. (2015, November 13). Compromised Web Servers and Web Shells - Threat Awareness and Guidance. Retrieved June 8, 2016.
Upham, K. (2014, March). Going Deep into the BIOS with MITRE Firmware Security Research. Retrieved January 5, 2016.
Vasilenko, R. (2013, December 17). An Analysis of PlugX Malware. Retrieved November 24, 2015.
Veil Framework. (n.d.). Retrieved December 4, 2014.
Villeneuve, N., Bennett, J. T., Moran, N., Haq, T., Scott, M., & Geers, K. (2014). OPERATION “KE3CHANG”: Targeted Attacks Against Ministries of Foreign Affairs. Retrieved November 12, 2014.
Villeneuve, N., Haq, H., Moran, N. (2013, August 23). OPERATION MOLERATS: MIDDLE EAST CYBER ATTACKS USING POISON IVY. Retrieved April 1, 2016.
Villeneuve, N., Homan, J. (2014, July 31). Spy of the Tiger. Retrieved September 29, 2015.
Villeneuve, N., Sancho, D. (2011). THE “LURID” DOWNLOADER. Retrieved November 12, 2014.
virtualization.info. (Interviewer) & Liguori, A. (Interviewee). (2006, August 11). Debunking Blue Pill myth [Interview transcript]. Retrieved November 13, 2014.
Ward, S.. (2014, October 14). Sandworm Team and the Ukrainian Power Authority Attacks. Retrieved April 8, 2016.
Wikipedia. (n.d.). List of network protocols (OSI model). Retrieved December 4, 2014.
Wikipedia. (2016, March 31). List of file signatures. Retrieved April 22, 2016.
Wikipedia. (n.d.). Windows Registry. Retrieved February 2, 2015.
Wikipedia. (2016, June 12). Server Message Block. Retrieved June 12, 2016.
Wikipedia. (2015, November 10). Code Signing. Retrieved March 31, 2016.
Wikipedia. (2016, January 26). ifconfig. Retrieved April 17, 2016.
Wikipedia. (1985, June 22). pwdump. Retrieved June 22, 2016.
Wikipedia. (n.d.). Password cracking. Retrieved December 23, 2015.
Wikipedia. (2016, June 15). File Transfer Protocol. Retrieved July 20, 2016.
Wikipedia. (2016, June 1). Rootkit. Retrieved June 2, 2016.
Wikipedia. (n.d.). Control-flow integrity. Retrieved September 25, 2020.
Wikipedia. (2016, May 23). Hypervisor. Retrieved June 11, 2016.
Wikipedia. (n.d.). BIOS. Retrieved January 5, 2016.
Wikipedia. (2016, June 26). Command-line interface. Retrieved June 27, 2016.
Wilhoit, K. (2013, March 4). In-Depth Look: APT Attack Tools of the Trade. Retrieved December 2, 2015.
William Largent. (2018, June 06). VPNFilter Update - VPNFilter exploits endpoints, targets new devices. Retrieved March 28, 2019.
Winters, R.. (2015, December 20). The EPS Awakens - Part 2. Retrieved January 22, 2016.
Wrightson, T. (2012, January 2). CAPTURING WINDOWS 7 CREDENTIALS AT LOGON USING CUSTOM CREDENTIAL PROVIDER. Retrieved November 12, 2014.
Wyke, J. (2012, April). ZeroAccess. Retrieved July 18, 2016.
Xen. (n.d.). In Wikipedia. Retrieved November 13, 2014.
Yadav, A., et al. (2016, January 29). Malicious Office files dropping Kasidet and Dridex. Retrieved March 24, 2016.
Zack Whittaker. (2017, April 12). Dallas' emergency sirens were hacked with a rogue radio signal. Retrieved November 6, 2020.
Zetter, Kim. (2016, March 03). INSIDE THE CUNNING, UNPRECEDENTED HACK OF UKRAINE'S POWER GRID. Retrieved March 8, 2019.
Zhang, H., Papadopoulos, C., & Massey, D. (2013, April). Detecting encrypted botnet traffic. Retrieved August 19, 2015.