Click here to download all references as Bib-File.•
2018-03-08
⋅
Avast
⋅
New investigations into the CCleaner incident point to a possible third stage that had keylogger capacities CCleaner Backdoor |
2018-02-28
⋅
Symantec
⋅
Chafer: Latest Attacks Reveal Heightened Ambitions MimiKatz Remexi |
2018-02-21
⋅
Avast
⋅
Avast tracks down Tempting Cedar Spyware TemptingCedar Spyware |
2017-10-20
⋅
Symantec
⋅
Dragonfly: Western energy sector targeted by sophisticated attack group Dorshel Goodor Heriplor Karagany Listrix ENERGETIC BEAR |
2017-09-25
⋅
Avast
⋅
Additional information regarding the recent CCleaner APT security incident CCleaner Backdoor |
2017-09-21
⋅
Avast
⋅
Avast Threat Labs analysis of CCleaner incident CCleaner Backdoor |
2017-07-17
⋅
Malwarebytes
⋅
It’s baaaack: Public cyber enemy Emotet has returned Emotet |
2017-06-28
⋅
CrowdStrike
⋅
CrowdStrike Protects Against NotPetya Attack EternalPetya |
2017-04-13
⋅
CrowdStrike
⋅
Inside the Takedown of ZOMBIE SPIDER and the Kelihos Botnet Kelihos ZOMBIE SPIDER |
2016-09-20
⋅
Avast
⋅
Inside Petya and Mischa ransomware Petya |
2016-04-06
⋅
Avast
⋅
Andromeda under the microscope Andromeda |
2015-08-17
⋅
F-Secure Labs
⋅
THE DUKES 7 YEARS OF RUSSIAN CYBERESPIONAGE COZYDUKE GeminiDuke |
2014-06-09
⋅
CrowdStrike
⋅
CrowdStrike Intelligence Report: Putter Panda APT2 |
2013-06-01
⋅
CrowdStrike
⋅
DEEP PANDA APT19 |
2013-05-20
⋅
Avast
⋅
Lockscreen Win32:Lyposit displayed as a fake MacOs app Lyposit |