Click here to download all references as Bib-File.
2015-09-24 ⋅ Symantec ⋅ Kovter malware learns from Poweliks with persistent fileless registry update Kovter |
2015-08-27 ⋅ Symantec ⋅ Regin: Top-tier espionage tool enables stealthy surveillance Regin |
2015-07-08 ⋅ Symantec ⋅ Butterfly: Profiting from high-level corporate attacks WildNeutron |
2015-02-24 ⋅ Symantec ⋅ W32.Ramnit analysis Ramnit |
2014-10-14 ⋅ Symantec ⋅ Security vendors take action against Hidden Lynx malware HiKit |
2014-10-14 ⋅ Symantec ⋅ Security vendors take action against Hidden Lynx malware Gameover P2P HiKit Shylock APT17 |
2014-10-14 ⋅ Symantec ⋅ Sandworm Windows zero-day vulnerability being actively exploited in targeted attacks Sandworm |
2014-10-14 ⋅ Symantec ⋅ Sandworm Windows zero-day vulnerability being actively exploited in targeted attacks Sandworm |
2014-07-07 ⋅ Symantec ⋅ Dragonfly: Cyberespionage Attacks Against Energy Suppliers ENERGETIC BEAR |
2013-09-17 ⋅ Symantec ⋅ Hidden Lynx – Professional Hackers for Hire APT17 |
2013-06-26 ⋅ Symantec ⋅ Four Years of DarkSeoul Cyberattacks Against South Korea Continue on Anniversary of Korean War Lazarus Group |
2013-02-19 ⋅ Symantec ⋅ APT1: Q&A on Attacks by the Comment Crew |
2012-08-16 ⋅ Symantec ⋅ The Shamoon Attacks DistTrack OilRig |
2012-08-16 ⋅ Symantec ⋅ The Shamoon Attacks OilRig |
2012-07-17 ⋅ Symantec ⋅ The Madi Attacks: Series of Social Engineering Campaigns Madi |