Click here to download all references as Bib-File.

Enter keywords to filter the library entries below or Propose new Entry
2018-02-21AvastThreat Intelligence Team
Avast tracks down Tempting Cedar Spyware
TemptingCedar Spyware
2017-10-20SymantecCritical Attack Discovery and Intelligence Team
Dragonfly: Western energy sector targeted by sophisticated attack group
Dorshel Goodor Heriplor Karagany Listrix ENERGETIC BEAR
2017-09-25AvastThreat Intelligence Team
Additional information regarding the recent CCleaner APT security incident
CCleaner Backdoor
2017-09-21AvastThreat Intelligence Team
Avast Threat Labs analysis of CCleaner incident
CCleaner Backdoor
2017-07-17MalwarebytesThreat Intelligence Team
It’s baaaack: Public cyber enemy Emotet has returned
Emotet
2017-06-28CrowdStrikeFalcon Intelligence Team
CrowdStrike Protects Against NotPetya Attack
EternalPetya
2017-04-13CrowdStrikeFalcon Intelligence Team
Inside the Takedown of ZOMBIE SPIDER and the Kelihos Botnet
Kelihos ZOMBIE SPIDER
2016-09-20AvastThreat Intelligence Team
Inside Petya and Mischa ransomware
Petya
2016-04-06AvastThreat Intelligence Team
Andromeda under the microscope
Andromeda
2015-08-17F-Secure LabsF-Secure Threat Intelligence Team, Noora Hyvärinen
THE DUKES 7 YEARS OF RUSSIAN CYBERESPIONAGE
COZYDUKE GeminiDuke
2014-06-09CrowdStrikeCrowdstrike Global intelliGenCe team
CrowdStrike Intelligence Report: Putter Panda
APT2
2013-06-01CrowdStrikeCrowdstrike Global intelliGenCe team
DEEP PANDA
APT19
2013-05-20AvastThreat Intelligence Team
Lockscreen Win32:Lyposit displayed as a fake MacOs app
Lyposit