Click here to download all references as Bib-File.

Enter keywords to filter the library entries below or Propose new Entry
2017-07-18ElasticAshkan Hosseini
Ten process injection techniques: A technical survey of common and trending process injection techniques
Cryakl CyberGate Dridex FinFisher RAT Locky
2017-05-25FlashpointFlashpoint
Linguistic Analysis of WannaCry Ransomware Messages Suggests Chinese-Speaking Authors
WannaCryptor
2017-04-10US Department of JusticeUS Department of Justice
Justice Department Announces Actions to Dismantle Kelihos Botnet
ZOMBIE SPIDER
2017-03-28Department of JusticeOffice of Public Affairs
Russian Citizen Pleads Guilty for Involvement in Global Botnet Conspiracy
Ebury
2017-01-10SecurityIntelligenceLimor Kessem, Lior Keshet
Client Maximus: New Remote Overlay Malware Highlights Rising Malcode Sophistication in Brazil
Client Maximus
2016-12-14Kaspersky LabsKaspersky
Kaspersky Security Bulletin 2016. Review of the year. Overall statistics for 2016
Operation Ghoul
2016-12-03Coding and SecurityCoding, Security
"Sophisticated" and "Genius" Shamoon 2.0 Malware Analysis
DistTrack
2016-09-07Kaspersky LabsStefan Ortloff
The Missing Piece – Sophisticated OS X Backdoor Discovered
Mokes
2016-05-05SentinelOneJoseph Landry
Sophisticated New Packer Identified in CryptXXX Ransomware Sample
CryptXXXX
2016-04-06ProofpointChris Wakelin
Locky Ransomware Is Becoming More Sophisticated - Cybercriminals Continue Email Campaign Innovation
Rockloader
2016-01-22Department of JusticeDepartment of Justice
United States District Court Southern District New York vs. ITSEC Team
Cutting Kitten
2015-12-31ThreatBook
Overseas "Dark Inn" organization launched an APT attack on executives of domestic enterprises
DarkHotel
2015-11-24FireEyeStephen Ward
ModPOS: Highly-Sophisticated, Stealthy Malware Targeting US POS Systems with High Likelihood of Broader Campaigns
ModPOS
2015-06-10Kaspersky LabsGReAT
The Mystery of Duqu 2.0: a sophisticated cyberespionage actor returns
DuQu Unit 8200
2015-06-01Trend MicroJay Yaneza
MalumPOS History and Characteristics
MalumPOS
2014-12-09Blue CoatSnorre Fagerland, Waylon Grange
Blue Coat Exposes “The Inception Framework”; Very Sophisticated, Layered Malware Attack Targeted at Military, Diplomats, and Business Execs
CloudAtlas Inception Framework
2014-12-09SymantecWaylon Grange
Blue Coat Exposes “The Inception Framework”; Very Sophisticated, Layered Malware Attack Targeted at Military, Diplomats, and Bus
Inception Framework
2014-11-25Kaspersky LabsBrain Donohue
Regin APT Attacks Among the Most Sophisticated Ever Analyzed
Regin
2014-11-11G DataG Data
The Uroburos case: new sophisticated RAT identified
Agent.BTZ Uroburos
2014-09-05GoogleBilly Leonard, Neel Mehta, Shane Huntiey
Peering Into the Aquarium: Analysis of a Sophisticated Multi-Stage Malware Family
X-Agent
2014-08-07The GuardianTom Brewster
Sophisticated 'Turla' hackers spying on European governments, say researchers
Turla
2014-02-02Department of JusticeOffice of Public Affairs
U.S. Leads Multi-National Action Against “Gameover Zeus” Botnet and “Cryptolocker” Ransomware, Charges Botnet Administrator
CryptoLocker
2012-04-23enigmasoftDomesticus
BKDR_CYSXL.A
cysxl
1900-01-01Security AffairsPierluigi Paganini
Hackers Broke Into the Celeb London Bridge Plastic Surgery Clinic
TheDarkOverlord