Click here to download all references as Bib-File.•
2015-12-22
⋅
BBSRAT Attacks Targeting Russian Organizations Linked to Roaming Tiger Roaming Tiger |
2015-10-09
⋅
Palo Alto Networks Unit 42
⋅
Latest TeslaCrypt Ransomware Borrows Code From Carberp Trojan TeslaCrypt |
2015-08-20
⋅
Palo Alto Networks Unit 42
⋅
Retefe Banking Trojan Targets Sweden, Switzerland and Japan Retefe |
2015-07-20
⋅
paloalto Networks Unit 42
⋅
Watering Hole Attack on Aerospace Firm Exploits CVE-2015-5122 to Install IsSpace Backdoor IsSpace |
2015-04-18
⋅
FireEye
⋅
Operation RussianDoll: Adobe & Windows Zero-Day Exploits Likely Leveraged by Russia’s APT28 in Highly-Targeted Attack APT28 |
2015-04-14
⋅
Palo Alto Networks Unit 42
⋅
Unit 42 Identifies New DragonOK Backdoor Malware Deployed Against Japanese Targets DragonOK |
2015-04-14
⋅
Palo Alto Networks Unit 42
⋅
Unit 42 Identifies New DragonOK Backdoor Malware Deployed Against Japanese Targets FormerFirstRAT |
2015-03-19
⋅
Palo Alto Networks Unit 42
⋅
FindPOS: New POS Malware Family Discovered FindPOS |
2015-01-26
⋅
CrowdStrike
⋅
Storm Chasing: Hunting Hurricane Panda HURRICANE PANDA |
2014-11-21
⋅
FireEye
⋅
Operation Double Tap pirpi |
2014-07-31
⋅
FireEye
⋅
Spy of the Tiger paladin APT24 |
2014-07-15
⋅
Palo Alto Networks Unit 42
⋅
Unit 42 Technical Analysis: Seaduke SEADADDY |
2014-07-09
⋅
FireEye
⋅
BrutPOS: RDP Bruteforcing Botnet Targeting POS Systems BrutPOS |
2013-12-09
⋅
Trustwave
⋅
The Curious Case of the Malicious IIS Module IISniff |
2013-09-26
⋅
Malwarebytes
⋅
New Solarbot Malware Debuts, Creator Publicly Advertising Solarbot |
2013-08-01
⋅
Malwarebytes
⋅
Sophos Discovers ZeroAccess Using RLO ZeroAccess |
2013-07-25
⋅
Malwarebytes
⋅
ZeroAccess uses Self-Debugging ZeroAccess |
2013-06-03
⋅
Trustwave
⋅
Alina: Following The Shadow Part 2 Alina POS |
2013-05-17
⋅
Trustwave
⋅
Alina: Following The Shadow Part 1 Alina POS |
2013-05-08
⋅
SpiderLabs Blog
⋅
Alina: Casting a Shadow on POS Alina POS |
2012-12-13
⋅
SpiderLabs Blog
⋅
The Dexter Malware: Getting Your Hands Dirty |