Click here to download all references as Bib-File.•
2016-05-01
⋅
Check Point
⋅
Looking into Teslacrypt TeslaCrypt |
2015-10-01
⋅
Check Point
⋅
Digging for Groundhogs: Holes in your Linux server XOR DDoS |
2015-08-31
⋅
SecurityIntelligence
⋅
Shifu: ‘Masterful’ New Banking Trojan Is Attacking 14 Japanese Banks Shifu |
2015-05-15
⋅
Check Point
⋅
MATSNU Matsnu |
2015-04-13
⋅
CrowdStrike
⋅
Cyber Deterrence in Action? A story of one long HURRICANE PANDA campaign HURRICANE PANDA |
2015-04-13
⋅
CrowdStrike
⋅
Cyber Deterrence in Action? A story of one long HURRICANE PANDA campaign HURRICANE PANDA |
2014-10-14
⋅
CrowdStrike
⋅
CrowdStrike Discovers Use of 64-bit Zero-Day Privilege Escalation Exploit (CVE-2014-4113) by Hurricane Panda HURRICANE PANDA |
2014-07-07
⋅
CrowdStrike
⋅
Deep in Thought: Chinese Targeting of National Security Think Tanks APT19 |
2014-02-24
⋅
RSA Conference
⋅
The Art of Attribution Identifying and Pursuing your Cyber Adversaries ANDROMEDA SPIDER APT19 DEXTOROUS SPIDER Ghost Jackal Silent Chollima SINGING SPIDER Tonto Team TOXIC PANDA UNION SPIDER |
2012-09-13
⋅
Microsoft
⋅
Microsoft Disrupts the Emerging Nitol Botnet Being Spread through an Unsecure Supply Chain Nitol |
2008-11-24
⋅
NoVirusThanks Blog
⋅
I-Worm/Nuwar.W + Rustock.E Variant – Analysis Rustock |