Click here to download all references as Bib-File.

Enter keywords to filter the library entries below or Propose new Entry
2015-05-04Cisco TalosBen Baker, Alex Chiu
@online{baker:20150504:threat:726f1f2, author = {Ben Baker and Alex Chiu}, title = {{Threat Spotlight: Rombertik – Gazing Past the Smoke, Mirrors, and Trapdoors}}, date = {2015-05-04}, organization = {Cisco Talos}, url = {http://blogs.cisco.com/security/talos/rombertik}, language = {English}, urldate = {2020-01-06} } Threat Spotlight: Rombertik – Gazing Past the Smoke, Mirrors, and Trapdoors
Rombertik
2015-04-27Cisco TalosAndrea Allievi, Earl Carter, Emmanuel Tacheau
@online{allievi:20150427:threat:3754b13, author = {Andrea Allievi and Earl Carter and Emmanuel Tacheau}, title = {{Threat Spotlight: TeslaCrypt – Decrypt It Yourself}}, date = {2015-04-27}, organization = {Cisco Talos}, url = {https://blogs.cisco.com/security/talos/teslacrypt}, language = {English}, urldate = {2019-10-15} } Threat Spotlight: TeslaCrypt – Decrypt It Yourself
TeslaCrypt
2015-03-20Cisco TalosAndrea Allievi, Ben Baker, Nick Biasini, JJ Cummings, Douglas Goddard, William Largent, Angel Villegas, Alain Zidouemba
@online{allievi:20150320:threat:2f200b6, author = {Andrea Allievi and Ben Baker and Nick Biasini and JJ Cummings and Douglas Goddard and William Largent and Angel Villegas and Alain Zidouemba}, title = {{Threat Spotlight: PoSeidon, A Deep Dive Into Point of Sale Malware}}, date = {2015-03-20}, organization = {Cisco Talos}, url = {https://blogs.cisco.com/security/talos/poseidon}, language = {English}, urldate = {2020-01-13} } Threat Spotlight: PoSeidon, A Deep Dive Into Point of Sale Malware
FindPOS
2015-03-19Palo Alto Networks Unit 42Josh Grunzweig
@online{grunzweig:20150319:findpos:87059f2, author = {Josh Grunzweig}, title = {{FindPOS: New POS Malware Family Discovered}}, date = {2015-03-19}, organization = {Palo Alto Networks Unit 42}, url = {https://researchcenter.paloaltonetworks.com/2015/03/findpos-new-pos-malware-family-discovered/}, language = {English}, urldate = {2019-12-20} } FindPOS: New POS Malware Family Discovered
FindPOS
2014-12-09ThreatpostMichael Mimoso
@online{mimoso:20141209:linux:67f8948, author = {Michael Mimoso}, title = {{Linux Modules Connected to Turla APT Discovered}}, date = {2014-12-09}, organization = {Threatpost}, url = {https://threatpost.com/linux-modules-connected-to-turla-apt-discovered/109765/}, language = {English}, urldate = {2019-11-26} } Linux Modules Connected to Turla APT Discovered
Turla Group
2014-10-30G DataG Data
@online{data:20141030:com:0da80b3, author = {G Data}, title = {{COM Object hijacking: the discreet way of persistence}}, date = {2014-10-30}, organization = {G Data}, url = {https://www.gdatasoftware.com/blog/2014/10/23941-com-object-hijacking-the-discreet-way-of-persistence}, language = {English}, urldate = {2020-01-07} } COM Object hijacking: the discreet way of persistence
COMpfun
2014-10-28CiscoAndrea Allievi, Douglas Goddard, Shaun Hurley, Alain Zidouemba
@online{allievi:20141028:threat:a302fbd, author = {Andrea Allievi and Douglas Goddard and Shaun Hurley and Alain Zidouemba}, title = {{Threat Spotlight: Group 72, Opening the ZxShell}}, date = {2014-10-28}, organization = {Cisco}, url = {https://blogs.cisco.com/security/talos/opening-zxshell}, language = {English}, urldate = {2019-10-15} } Threat Spotlight: Group 72, Opening the ZxShell
ZXShell
2014-10-27NetresecErik Hjelmvik
@online{hjelmvik:20141027:full:83d84ee, author = {Erik Hjelmvik}, title = {{Full Disclosure of Havex Trojans}}, date = {2014-10-27}, organization = {Netresec}, url = {http://www.netresec.com/?page=Blog&month=2014-10&post=Full-Disclosure-of-Havex-Trojans}, language = {English}, urldate = {2019-11-29} } Full Disclosure of Havex Trojans
Energetic Bear
2014-10-14CrowdStrikeDmitri Alperovitch
@online{alperovitch:20141014:crowdstrike:9be6684, author = {Dmitri Alperovitch}, title = {{CrowdStrike Discovers Use of 64-bit Zero-Day Privilege Escalation Exploit (CVE-2014-4113) by Hurricane Panda}}, date = {2014-10-14}, organization = {CrowdStrike}, url = {https://www.crowdstrike.com/blog/crowdstrike-discovers-use-64-bit-zero-day-privilege-escalation-exploit-cve-2014-4113-hurricane-panda/}, language = {English}, urldate = {2020-06-03} } CrowdStrike Discovers Use of 64-bit Zero-Day Privilege Escalation Exploit (CVE-2014-4113) by Hurricane Panda
Hurricane Panda
2014-07-11SecurityIntelligenceEtay Maor
@online{maor:20140711:father:7c022b3, author = {Etay Maor}, title = {{The Father of Zeus: Kronos Malware Discovered}}, date = {2014-07-11}, organization = {SecurityIntelligence}, url = {https://securityintelligence.com/the-father-of-zeus-kronos-malware-discovered/}, language = {English}, urldate = {2020-01-09} } The Father of Zeus: Kronos Malware Discovered
2014-07-07QianxinRed Raindrop Team
@online{team:20140707:analysis:e586631, author = {Red Raindrop Team}, title = {{Analysis and disclosure of the CIA's cyber arsenal}}, date = {2014-07-07}, organization = {Qianxin}, url = {https://ti.qianxin.com/blog/articles/network-weapons-of-cia/}, language = {Chinese}, urldate = {2019-12-19} } Analysis and disclosure of the CIA's cyber arsenal
Lambert
2013-12-04Cisco TalosCraig Williams
@online{williams:20131204:internet:d904381, author = {Craig Williams}, title = {{The Internet of Everything, Including Malware}}, date = {2013-12-04}, organization = {Cisco Talos}, url = {https://blogs.cisco.com/security/the-internet-of-everything-including-malware}, language = {English}, urldate = {2019-08-08} } The Internet of Everything, Including Malware
Zollard
2013-08-01MalwarebytesJoshua Cannell
@online{cannell:20130801:sophos:404c6a5, author = {Joshua Cannell}, title = {{Sophos Discovers ZeroAccess Using RLO}}, date = {2013-08-01}, organization = {Malwarebytes}, url = {https://blog.malwarebytes.com/threat-analysis/2013/08/sophos-discovers-zeroaccess-using-rlo/}, language = {English}, urldate = {2019-12-20} } Sophos Discovers ZeroAccess Using RLO
ZeroAccess
2013-05-01CiscoMary Landesman
@online{landesman:20130501:linuxcdorked:348acc3, author = {Mary Landesman}, title = {{Linux/CDorked FAQs}}, date = {2013-05-01}, organization = {Cisco}, url = {https://blogs.cisco.com/security/linuxcdorked-faqs}, language = {English}, urldate = {2020-01-09} } Linux/CDorked FAQs
CDorked
2012-12-15R136a1
@online{r136a1:20121215:disclosure:fdfe8f2, author = {R136a1}, title = {{Disclosure of another 0day malware - Analysis of 2nd Dropper and 3rd Dropper (Part 2)}}, date = {2012-12-15}, url = {http://www.malware-reversing.com/2012/12/3-disclosure-of-another-0day-malware_15.html}, language = {English}, urldate = {2019-12-31} } Disclosure of another 0day malware - Analysis of 2nd Dropper and 3rd Dropper (Part 2)
Sedreco
2012-12-15Malware Reversing BlogR136a1
@online{r136a1:20121215:disclosure:c36a5a8, author = {R136a1}, title = {{Disclosure of another 0day malware - Initial Dropper and Downloader (Part 1)}}, date = {2012-12-15}, organization = {Malware Reversing Blog}, url = {http://www.malware-reversing.com/2012/12/3-disclosure-of-another-0day-malware.html}, language = {English}, urldate = {2020-01-06} } Disclosure of another 0day malware - Initial Dropper and Downloader (Part 1)
Coreshell
2012-11-13SophosGraham Cluley
@online{cluley:20121113:new:627d122, author = {Graham Cluley}, title = {{New variant of Mac Trojan discovered, targeting Tibet}}, date = {2012-11-13}, organization = {Sophos}, url = {https://nakedsecurity.sophos.com/2012/11/13/new-mac-trojan/}, language = {English}, urldate = {2020-01-08} } New variant of Mac Trojan discovered, targeting Tibet
iMuler
2012-10-12The Mac Security BlogLysa Myers
@online{myers:20121012:new:33ecff1, author = {Lysa Myers}, title = {{New Multiplatform Backdoor Jacksbot Discovered}}, date = {2012-10-12}, organization = {The Mac Security Blog}, url = {https://www.intego.com/mac-security-blog/new-multiplatform-backdoor-jacksbot-discovered}, language = {English}, urldate = {2020-01-09} } New Multiplatform Backdoor Jacksbot Discovered
jRAT
2012-07-24The Mac Security BlogLysa Myers
@online{myers:20120724:new:2dbd887, author = {Lysa Myers}, title = {{New Apple Mac Trojan Called OSX/Crisis Discovered}}, date = {2012-07-24}, organization = {The Mac Security Blog}, url = {https://www.intego.com/mac-security-blog/new-apple-mac-trojan-called-osxcrisis-discovered-by-intego-virus-team/?}, language = {English}, urldate = {2020-01-09} } New Apple Mac Trojan Called OSX/Crisis Discovered
Crisis RCS
2012-07-17Kaspersky LabsKaspersky
@online{kaspersky:20120717:kaspersky:bbbf635, author = {Kaspersky}, title = {{Kaspersky Lab and Seculert Announce ‘Madi,’ a Newly Discovered Cyber-Espionage Campaign in the Middle East}}, date = {2012-07-17}, organization = {Kaspersky Labs}, url = {https://www.kaspersky.com/about/press-releases/2012_kaspersky-lab-and-seculert-announce--madi--a-newly-discovered-cyber-espionage-campaign-in-the-middle-east}, language = {English}, urldate = {2019-12-10} } Kaspersky Lab and Seculert Announce ‘Madi,’ a Newly Discovered Cyber-Espionage Campaign in the Middle East
Madi