Click here to download all references as Bib-File.

Enter keywords to filter the library entries below or Propose new Entry
2015-09-24SymantecSymantec Security Response
Kovter malware learns from Poweliks with persistent fileless registry update
Kovter
2015-08-27SymantecSymantec Security Response
Regin: Top-tier espionage tool enables stealthy surveillance
Regin
2015-07-08SymantecSymantec Security Response
Butterfly: Profiting from high-level corporate attacks
WildNeutron
2015-02-24SymantecSymantec Security Response
W32.Ramnit analysis
Ramnit
2014-10-14SymantecSymantec Security Response
Security vendors take action against Hidden Lynx malware
Gameover P2P HiKit Shylock APT17
2014-10-14SymantecSymantec Security Response
Sandworm Windows zero-day vulnerability being actively exploited in targeted attacks
Sandworm
2014-10-14SymantecSymantec Security Response
Sandworm Windows zero-day vulnerability being actively exploited in targeted attacks
Sandworm
2014-10-14SymantecSymantec Security Response
Security vendors take action against Hidden Lynx malware
HiKit
2014-07-07SymantecSymantec Security Response
Dragonfly: Cyberespionage Attacks Against Energy Suppliers
ENERGETIC BEAR
2013-09-17SymantecSymantec Security Response
Hidden Lynx – Professional Hackers for Hire
APT17
2013-06-26SymantecSymantec Security Response
Four Years of DarkSeoul Cyberattacks Against South Korea Continue on Anniversary of Korean War
Lazarus Group
2013-02-19SymantecSymantec Security Response
APT1: Q&A on Attacks by the Comment Crew
2012-08-16SymantecSymantec Security Response
The Shamoon Attacks
DistTrack OilRig
2012-08-16SymantecSymantec Security Response
The Shamoon Attacks
OilRig
2012-07-17SymantecSymantec Security Response
The Madi Attacks: Series of Social Engineering Campaigns
Madi