Click here to download all references as Bib-File.
2015-02-05 ⋅ FireEye ⋅ Anatomy of a Brute Force Campaign: The Story of Hee Thai Limited XOR DDoS |
2015-01-29 ⋅ JPCERT/CC ⋅ Analysis of a Recent PlugX Variant - “P2P PlugX” PlugX |
2014-11-03 ⋅ Kaspersky Labs ⋅ BE2 custom plugins, router abuse, and target profiles BlackEnergy |
2014-10-27 ⋅ PWC ⋅ ScanBox framework – who’s affected, and who’s using it? Jolob |
2014-10-20 ⋅ PWC ⋅ OrcaRAT - A whale of a tale OrcaRAT |
2014-09-19 ⋅ PWC ⋅ Malware microevolution RapidStealer |
2014-08-07 ⋅ The Guardian ⋅ Sophisticated 'Turla' hackers spying on European governments, say researchers Turla |
2014-06-09 ⋅ SecurityIntelligence ⋅ ZeuS.Maple Variant Targets Canadian Online Banking Customers KINS |
2013-02-08 ⋅ VMWare Carbon Black ⋅ Bit9 and Our Customers’ Security APT17 |
2012-11-25 ⋅ Cryptome ⋅ Parastoo Hacks IAEA Charming Kitten |