Click here to download all references as Bib-File.•
| 2015-06-24
⋅
Spiceworks
⋅
Stealthy Cyberespionage Campaign Attacks With Social Engineering NanHaiShu |
| 2015-04-18
⋅
FireEye
⋅
Operation RussianDoll: Adobe & Windows Zero-Day Exploits Likely Leveraged by Russia’s APT28 in Highly-Targeted Attack APT28 |
| 2015-03-30
⋅
Symantec
⋅
New reconnaissance threat Trojan.Laziok targets the energy sector Laziok |
| 2015-03-11
⋅
Zscaler
⋅
Malvertising Targeting European Transit Users Poweliks |
| 2014-12-18
⋅
The Washington Post
⋅
KeyPoint network breach could affect thousands of federal workers APT19 |
| 2014-10-27
⋅
PWC
⋅
ScanBox framework – who’s affected, and who’s using it? Jolob |
| 2014-08-28
⋅
Trend Micro
⋅
BIFROSE Now More Evasive Through Tor, Used for Targeted Attack bifrose |
| 2014-05-01
⋅
Recorded Future
⋅
Hunting Hidden Lynx: How OSINT is Crucial for APT Analysis APT17 |
| 2014-03-06
⋅
Threatpost
⋅
Dexter, Project Hook POS Malware Campaigns Persist Project Hook POS |
| 2013-10-01
⋅
MALWARE Conference
⋅
Highly Resilient Peer-to-Peer Botnets Are Here: An Analysis of Gameover Zeus Gameover P2P |
| 2013-09-18
⋅
Zscaler
⋅
A New Wave Of WIN32/CAPHAW Attacks - A ThreatLabZ Analysis Shylock |
| 2012-07-25
⋅
Threatpost
⋅
New and Improved Madi Spyware Campaign Continues Madi |