Click here to download all references as Bib-File.•
2018-02-21
⋅
Avast
⋅
Avast tracks down Tempting Cedar Spyware TemptingCedar Spyware |
2018-01-01
⋅
FireEye
⋅
The Forrester New Wave™: External Threat Intelligence Services, Q3 2018. APT1 |
2017-09-25
⋅
Avast
⋅
Additional information regarding the recent CCleaner APT security incident CCleaner Backdoor |
2017-09-21
⋅
Avast
⋅
Avast Threat Labs analysis of CCleaner incident CCleaner Backdoor |
2017-07-17
⋅
Malwarebytes
⋅
It’s baaaack: Public cyber enemy Emotet has returned Emotet |
2016-09-20
⋅
Avast
⋅
Inside Petya and Mischa ransomware Petya |
2016-09-14
⋅
Deloitte
⋅
The evolution of the Nymaim Criminal Enterprise Threat Intelligence & Analytics Nymaim |
2016-04-06
⋅
Avast
⋅
Andromeda under the microscope Andromeda |
2016-01-28
⋅
FireEye
⋅
CenterPOS: An Evolving POS Threat CenterPOS |
2015-12-21
⋅
FireEye
⋅
The EPS Awakens - Part 2 ELMER IRONHALO EvilPost |
2015-12-01
⋅
FireEye
⋅
China-based Cyber Threat Group Uses Dropbox for Malware Communications and Targets Hong Kong Media Outlets BUBBLEWRAP LOWBALL TEMPER PANDA |
2015-08-17
⋅
F-Secure Labs
⋅
THE DUKES 7 YEARS OF RUSSIAN CYBERESPIONAGE COZYDUKE GeminiDuke |
2015-07-01
⋅
FireEye
⋅
HAMMERTOSS: Stealthy Tactics Define a Russian Cyber Threat Group tDiscoverer APT29 |
2014-05-01
⋅
Arbor Networks
⋅
Into the Light of Day:Uncovering Ongoing and Historical Point of Sale Malware and Attack Campaigns poscardstealer |
2013-05-20
⋅
Avast
⋅
Lockscreen Win32:Lyposit displayed as a fake MacOs app Lyposit |