Click here to download all references as Bib-File.•
2017-05-09
⋅
Intrusiontruth
⋅
APT3 is Boyusec, a Chinese Intelligence Contractor APT3 Keylogger |
2017-03-15
⋅
Bleeping Computer
⋅
Revenge Ransomware, a CryptoMix Variant, Being Distributed by RIG Exploit Kit CryptoShield |
2017-02-03
⋅
Zeus Panda Webinjects: a case study PandaBanker |
2017-01-18
⋅
Reuters
⋅
Ukraine's power outage was a cyber attack: Ukrenergo ENERGETIC BEAR |
2016-12-15
⋅
Malwarebytes
⋅
Goldeneye Ransomware – the Petya/Mischa combo rebranded |
2016-11-30
⋅
Fortinet
⋅
Bladabindi Remains A Constant Threat By Using Dynamic DNS Services NjRAT |
2016-09-23
⋅
FireEye
⋅
Hancitor (AKA Chanitor) observed using multiple attack approaches Hancitor |
2016-09-06
⋅
⋅
KZ CERT
⋅
KZ-CERT has analyzed another sample of malicious software, which is a component of targeted attacks (Targeted attacks, Advanced Persistent Threats (APT)) Icefog |
2016-08-16
⋅
SecurityIntelligence
⋅
Brazil Can’t Catch a Break: After Panda Comes the Sphinx Zeus OpenSSL |
2016-05-19
⋅
Blackberry
⋅
Petya and Mischa for All! The RaaS Boom Expands to Include the Petya/Mischa Combo Petya |
2016-03-28
⋅
FireEye
⋅
TREASUREHUNT: A Custom POS Malware Tool TreasureHunter |
2016-03-02
⋅
RSA Conference
⋅
Dissecting Derusbi Derusbi |
2016-03-01
⋅
PWC
⋅
Taiwan Presidential Election: A Case Study on Thematic Targeting SunOrcal |
2016-01-22
⋅
FortiGuard Labs
⋅
CVE-2015-4400 : Backdoorbot, Network Configuration Leak on a Connected Doorbell |
2016-01-12
⋅
FireEye
⋅
The Magnificent FIN7: Revealing a Cybercriminal Threat Group BABYMETAL |
2016-01-09
⋅
Industrial Control Systems
⋅
Confirmation of a Coordinated Attack on the Ukrainian Power Grid Sandworm |
2015-12-30
⋅
CrowdStrike
⋅
Bringing A Cannon To A Knife Fight |
2015-11-02
⋅
⋅
CyS Centrum
⋅
Modular trojan for hidden access to a computer LatentBot |
2015-11-01
⋅
Check Point
⋅
ROCKET KIT TEN: A CAMPAIGN WITH 9 LIVES FireMalv MPKBot Woolger Cleaver Rocket Kitten |
2015-09-28
⋅
Kaspersky Labs
⋅
Gaza cybergang, where’s your IR team? Molerats |