Click here to download all references as Bib-File.

Enter keywords to filter the library entries below or Propose new Entry
2014-02-24RSA ConferenceDmitri Alperovitch
The Art of Attribution Identifying and Pursuing your Cyber Adversaries
ANDROMEDA SPIDER APT19 DEXTOROUS SPIDER Ghost Jackal Silent Chollima SINGING SPIDER Tonto Team TOXIC PANDA UNION SPIDER
2014-01-01RSARSA Research
RSA Incident Response: Emerging Threat Profile Shell_Crew
Derusbi
2013-10-29RSA ConferenceJaromír Hořejší, Peter Kálnai
Dissecting Banking Trojan Carberp
Carberp
2013-10-29RSA ConferenceJaromír Hořejší, Peter Kálnai
Dissecting Banking Trojan Carberp
Carberp
2013-10-16CrowdStrikeAdam Meyers
CrowdCasts Monthly: You Have an Adversary Problem
ELECTRIC PANDA GIBBERISH PANDA TEST PANDA
2013-08-07RSALimor Kessem
Thieves Reaching for Linux—”Hand of Thief” Trojan Targets Linux #INTH3WILD
Hand of Thief
2013-07-30ESET Researchwelivesecurity
Versatile and infectious: Win64/Expiro is a cross‑platform file infector
Expiro
2013-06-26SymantecSymantec Security Response
Four Years of DarkSeoul Cyberattacks Against South Korea Continue on Anniversary of Korean War
Lazarus Group
2013-06-26SymantecSecurity Response
Four Years of DarkSeoul Cyberattacks Against South Korea Continue on Anniversary of Korean War
Lazarus Group
2010-10-25RSARSA FraudAction Research Labs
Businesses Beware: Qakbot Spreads like a Worm, Stings like a Trojan
QakBot
2010-02-19MalwareIntelligenceJorge Mieres
SpyEye Bot (Part two). Conversations with the creator of crimeware
SpyEye