Click here to download all references as Bib-File.

Enter keywords to filter the library entries below or Propose new Entry
2018-07-25Palo Alto Networks Unit 42Bryan Lee, Robert Falcone
OilRig Targets Technology Service Provider and Government Agency with QUADAGENT
OilRig
2018-07-03HaaretzYaniv Kubovich
Hamas Cyber Ops Spied on Hundreds of Israeli Soldiers Using Fake World Cup, Dating Apps
GlanceLove
2017-12-01Check PointNeomi Rona, Stanislav Skuratovich
Nine circles of Cerber
Cerber
2017-11-14Digital GuardianChris Brook
IceID Banking Trojan Targeting Banks, Payment Card Providers, E-Commerce Sites
IcedID
2017-10-05Palo Alto Networks Unit 42Esmid Idrizovic, Juan Cortes
FreeMilk: A Highly Targeted Spear Phishing Campaign
APT37
2017-10-05Palo Alto Networks Unit 42Esmid Idrizovic, Juan Cortes
FreeMilk: A Highly Targeted Spear Phishing Campaign
Freenki Loader PoohMilk Loader
2017-09-21ESET ResearchFilip Kafka
New FinFisher surveillance campaigns: Internet providers involved?
FinFisher RAT
2017-09-01BitdefenderAlexandru Maximciuc, Cristina Vatamanu
EHDevel – The story of a continuously improving advanced threat creation toolkit
EHDevel
2017-07-13ProofpointProofpoint Staff
Meet Ovidiy Stealer: Bringing credential theft to the masses
OvidiyStealer
2017-06-27Palo Alto Networks Unit 42Esmid Idrizovic, Tom Lancaster
Paranoid PlugX
PlugX
2017-04-27Palo Alto Networks Unit 42Robert Falcone
OilRig Actors Provide a Glimpse into Development and Testing Efforts
OilRig
2017-03-28SecurityIntelligenceIlya Kolmanovich, Limor Kessem
The NukeBot Trojan, a Bruised Ego and a Surprising Source Code Leak
TinyNuke
2017-03-28Palo Alto Networks Unit 42Brandon Levene, Dominik Reichel, Esmid Idrizovic
Dimnie: Hiding in Plain Sight
Dimnie
2017-03-13MorphisecRoy Moshailov
Moving Target Defense Blog
Andromeda
2017-03-13Core SecurityCore Security
Behind a Malware Lifecycle and Infection Chain: Linking Asprox, Zemot, Rovix and Rerdom Malware Families
Rerdom
2017-01-18ReutersOleg Vukmanovic, Pavel Polityuk, Stephen Jewkes
Ukraine's power outage was a cyber attack: Ukrenergo
ENERGETIC BEAR
2016-11-22Palo Alto Networks Unit 42Jen Miller-Osborn, Robert Falcone, Tom Lancaster, Vicky Ray
Tropic Trooper Targets Taiwanese Government and Fossil Fuel Provider With Poison Ivy
APT23
2016-11-22Palo Alto Networks Unit 42Jen Miller-Osborn, Robert Falcone, Tom Lancaster, Vicky Ray
Tropic Trooper Targets Taiwanese Government and Fossil Fuel Provider With Poison Ivy
Winsloader Yahoyah APT23
2016-11-22Palo Alto Networks Unit 42Jen Miller-Osborn, Robert Falcone, Tom Lancaster, Vicky Ray
Tropic Trooper Targets Taiwanese Government and Fossil Fuel Provider With Poison Ivy
Poison Ivy
2016-06-15CrowdStrikeDmitri Alperovitch
Bears in the Midst: Intrusion into the Democratic National Committee
X-Agent ATI-Agent SEADADDY Seduploader X-Agent XTunnel APT28