Click here to download all references as Bib-File.

Enter keywords to filter the library entries below or Propose new Entry
2012-11-22SymantecSecurity Response
W32.Narilam – Business Database Sabotage
Narilam
2012-11-16SymantecTakashi Katsuki
Malware Targeting Windows 8 Uses Google Docs
Makadocs
2012-09-07SymantecGavin O'Gorman, Geoff McDonald
The Elderwood Project
9002 RAT Beijing Group
2012-09-07SymantecGavin O'Gorman, Geoff McDonald
The Elderwood Project
9002 RAT Beijing Group
2012-09-06SymantecGavin O'Gorman, Geoff McDonald
The Elderwood Project
Beijing Group
2012-09-06SymantecGavin O'Gorman, Geoff McDonald
The Elderwood Project
Beijing Group
2012-08-20SymantecTakashi Katsuki
Crisis for Windows Sneaks onto Virtual Machines
Crisis RCS
2012-08-16SymantecSymantec Security Response
The Shamoon Attacks
DistTrack OilRig
2012-08-16SymantecSymantec Security Response
The Shamoon Attacks
OilRig
2012-08-08SymantecSymantec
Trojan.Mebroot
Sinowal
2012-07-18SymantecSecurity Response
The Madi Attacks: Series of Social Engineering Campaigns
Madi
2012-07-17SymantecSymantec Security Response
The Madi Attacks: Series of Social Engineering Campaigns
Madi
2012-05-31SymantecSecurity Response
Flamer: A Recipe for Bluetoothache
Flame
2012-03-01SymantecSymantec
The Luckycat Hackers
Lucky Cat
2012-02-22SymantecSymantec
Trojan.Ransomlock.J
Ransomlock
2012-01-01SymantecVarious
The Luckycat Hackers
Lucky Cat
2012-01-01SymantecNicolas Falliere
W32.Qakbot in Detail
QakBot
2011-12-08SymantecVikram Thakur
The Sykipot Attacks
sykipot
2011-11-23SymantecSymantec
W32.Duqu: The precursor to the next Stuxnet
DuQu
2011-09-09SymantecLivian Ge
BIOS Threat is Showing up Again!
Mebromi