Click here to download all references as Bib-File.

Enter keywords to filter the library entries below or Propose new Entry
2017-05-09IntrusiontruthIntrusiontruth
APT3 is Boyusec, a Chinese Intelligence Contractor
APT3 Keylogger
2017-03-15Bleeping ComputerLawrence Abrams
Revenge Ransomware, a CryptoMix Variant, Being Distributed by RIG Exploit Kit
CryptoShield
2017-02-03Manuel K.-B.
Zeus Panda Webinjects: a case study
PandaBanker
2017-01-18ReutersOleg Vukmanovic, Pavel Polityuk, Stephen Jewkes
Ukraine's power outage was a cyber attack: Ukrenergo
ENERGETIC BEAR
2016-12-15MalwarebytesMalwarebytes Labs
Goldeneye Ransomware – the Petya/Mischa combo rebranded
2016-11-30FortinetLilia Elena Gonzalez Medina
Bladabindi Remains A Constant Threat By Using Dynamic DNS Services
NjRAT
2016-09-23FireEyeAnkit Anubhav, Dileep Kumar Jallepalli
Hancitor (AKA Chanitor) observed using multiple attack approaches
Hancitor
2016-09-06KZ CERTKZ CERT
KZ-CERT has analyzed another sample of malicious software, which is a component of targeted attacks (Targeted attacks, Advanced Persistent Threats (APT))
Icefog
2016-08-16SecurityIntelligenceDenis Laskov, Limor Kessem, Ziv Eli
Brazil Can’t Catch a Break: After Panda Comes the Sphinx
Zeus OpenSSL
2016-05-19BlackberryJim Walter
Petya and Mischa for All! The RaaS Boom Expands to Include the Petya/Mischa Combo
Petya
2016-03-28FireEyeNart Villeneuve
TREASUREHUNT: A Custom POS Malware Tool
TreasureHunter
2016-03-02RSA ConferenceVanja Svajcer
Dissecting Derusbi
Derusbi
2016-03-01PWCMichael Yip
Taiwan Presidential Election: A Case Study on Thematic Targeting
SunOrcal
2016-01-22FortiGuard LabsRuchna Nigam
CVE-2015-4400 : Backdoorbot, Network Configuration Leak on a Connected Doorbell
2016-01-12FireEyeBarry Vengerik, John Miller
The Magnificent FIN7: Revealing a Cybercriminal Threat Group
BABYMETAL
2016-01-09Industrial Control SystemsRobert M. Lee
Confirmation of a Coordinated Attack on the Ukrainian Power Grid
Sandworm
2015-12-30CrowdStrikeAdam Kozy, Johannes Gilger
Bringing A Cannon To A Knife Fight
2015-11-02CyS CentrumCyS Centrum Incident Response Team
Modular trojan for hidden access to a computer
LatentBot
2015-11-01Check PointCheck Point
ROCKET KIT TEN: A CAMPAIGN WITH 9 LIVES
FireMalv MPKBot Woolger Cleaver Rocket Kitten
2015-09-28Kaspersky LabsGhareeb Saad, Mohamad Amin Hasbini
Gaza cybergang, where’s your IR team?
Molerats