Click here to download all references as Bib-File.•
2015-09-24
⋅
Symantec
⋅
Kovter malware learns from Poweliks with persistent fileless registry update Kovter |
2015-08-27
⋅
Symantec
⋅
Regin: Top-tier espionage tool enables stealthy surveillance Regin |
2015-07-08
⋅
Symantec
⋅
Butterfly: Profiting from high-level corporate attacks WildNeutron |
2015-02-24
⋅
Symantec
⋅
W32.Ramnit analysis Ramnit |
2014-10-14
⋅
Symantec
⋅
Security vendors take action against Hidden Lynx malware Gameover P2P HiKit Shylock APT17 |
2014-10-14
⋅
Symantec
⋅
Sandworm Windows zero-day vulnerability being actively exploited in targeted attacks Sandworm |
2014-10-14
⋅
Symantec
⋅
Sandworm Windows zero-day vulnerability being actively exploited in targeted attacks Sandworm |
2014-10-14
⋅
Symantec
⋅
Security vendors take action against Hidden Lynx malware HiKit |
2014-07-07
⋅
Symantec
⋅
Dragonfly: Cyberespionage Attacks Against Energy Suppliers ENERGETIC BEAR |
2013-09-17
⋅
Symantec
⋅
Hidden Lynx – Professional Hackers for Hire APT17 |
2013-06-26
⋅
Symantec
⋅
Four Years of DarkSeoul Cyberattacks Against South Korea Continue on Anniversary of Korean War Lazarus Group |
2013-02-19
⋅
Symantec
⋅
APT1: Q&A on Attacks by the Comment Crew |
2012-08-16
⋅
Symantec
⋅
The Shamoon Attacks DistTrack OilRig |
2012-08-16
⋅
Symantec
⋅
The Shamoon Attacks OilRig |
2012-07-17
⋅
Symantec
⋅
The Madi Attacks: Series of Social Engineering Campaigns Madi |