Click here to download all references as Bib-File.•
2017-03-13
⋅
Morphisec
⋅
Moving Target Defense Blog Andromeda |
2017-03-13
⋅
Core Security
⋅
Behind a Malware Lifecycle and Infection Chain: Linking Asprox, Zemot, Rovix and Rerdom Malware Families Rerdom |
2017-01-18
⋅
Reuters
⋅
Ukraine's power outage was a cyber attack: Ukrenergo ENERGETIC BEAR |
2016-11-22
⋅
Palo Alto Networks Unit 42
⋅
Tropic Trooper Targets Taiwanese Government and Fossil Fuel Provider With Poison Ivy APT23 |
2016-11-22
⋅
Palo Alto Networks Unit 42
⋅
Tropic Trooper Targets Taiwanese Government and Fossil Fuel Provider With Poison Ivy Winsloader Yahoyah APT23 |
2016-11-22
⋅
Palo Alto Networks Unit 42
⋅
Tropic Trooper Targets Taiwanese Government and Fossil Fuel Provider With Poison Ivy Poison Ivy |
2016-06-15
⋅
CrowdStrike
⋅
Bears in the Midst: Intrusion into the Democratic National Committee X-Agent ATI-Agent SEADADDY Seduploader X-Agent XTunnel APT28 |
2016-05-01
⋅
Check Point
⋅
Looking into Teslacrypt TeslaCrypt |
2015-10-01
⋅
Check Point
⋅
Digging for Groundhogs: Holes in your Linux server XOR DDoS |
2015-08-31
⋅
SecurityIntelligence
⋅
Shifu: ‘Masterful’ New Banking Trojan Is Attacking 14 Japanese Banks Shifu |
2015-05-15
⋅
Check Point
⋅
MATSNU Matsnu |
2015-04-13
⋅
CrowdStrike
⋅
Cyber Deterrence in Action? A story of one long HURRICANE PANDA campaign HURRICANE PANDA |
2015-04-13
⋅
CrowdStrike
⋅
Cyber Deterrence in Action? A story of one long HURRICANE PANDA campaign HURRICANE PANDA |
2014-10-14
⋅
CrowdStrike
⋅
CrowdStrike Discovers Use of 64-bit Zero-Day Privilege Escalation Exploit (CVE-2014-4113) by Hurricane Panda HURRICANE PANDA |
2014-07-07
⋅
CrowdStrike
⋅
Deep in Thought: Chinese Targeting of National Security Think Tanks APT19 |
2014-02-24
⋅
RSA Conference
⋅
The Art of Attribution Identifying and Pursuing your Cyber Adversaries ANDROMEDA SPIDER APT19 DEXTOROUS SPIDER Ghost Jackal Silent Chollima SINGING SPIDER Tonto Team TOXIC PANDA UNION SPIDER |
2012-09-13
⋅
Microsoft
⋅
Microsoft Disrupts the Emerging Nitol Botnet Being Spread through an Unsecure Supply Chain Nitol |
2008-11-24
⋅
NoVirusThanks Blog
⋅
I-Worm/Nuwar.W + Rustock.E Variant – Analysis Rustock |