Click here to download all references as Bib-File.

Enter keywords to filter the library entries below or Propose new Entry
2016-08-16SecurityIntelligenceDenis Laskov, Limor Kessem, Ziv Eli
Brazil Can’t Catch a Break: After Panda Comes the Sphinx
Zeus OpenSSL
2016-08-16SecurityIntelligenceDenis Laskov, Limor Kessem, Ziv Eli
Brazil Can’t Catch a Break: After Panda Comes the Sphinx
Zeus OpenSSL
2016-05-19BlackberryJim Walter
Petya and Mischa for All! The RaaS Boom Expands to Include the Petya/Mischa Combo
Petya
2016-03-28FireEyeNart Villeneuve
TREASUREHUNT: A Custom POS Malware Tool
TreasureHunter
2016-03-02RSA ConferenceVanja Svajcer
Dissecting Derusbi
Derusbi
2016-03-01PWCMichael Yip
Taiwan Presidential Election: A Case Study on Thematic Targeting
SunOrcal
2016-01-22FortiGuard LabsRuchna Nigam
CVE-2015-4400 : Backdoorbot, Network Configuration Leak on a Connected Doorbell
2016-01-12FireEyeBarry Vengerik, John Miller
The Magnificent FIN7: Revealing a Cybercriminal Threat Group
BABYMETAL
2016-01-12FireEyeBarry Vengerik, John Miller
The Magnificent FIN7: Revealing a Cybercriminal Threat Group
BABYMETAL
2016-01-09Industrial Control SystemsRobert M. Lee
Confirmation of a Coordinated Attack on the Ukrainian Power Grid
Sandworm
2015-12-30CrowdStrikeAdam Kozy, Johannes Gilger
Bringing A Cannon To A Knife Fight
2015-12-30CrowdStrikeAdam Kozy, Johannes Gilger
Bringing A Cannon To A Knife Fight
2015-11-02CyS CentrumCyS Centrum Incident Response Team
Modular trojan for hidden access to a computer
LatentBot
2015-11-01Check PointCheck Point
ROCKET KIT TEN: A CAMPAIGN WITH 9 LIVES
FireMalv MPKBot Woolger Cleaver Rocket Kitten
2015-09-28Kaspersky LabsGhareeb Saad, Mohamad Amin Hasbini
Gaza cybergang, where’s your IR team?
Molerats
2015-09-28Kaspersky LabsGhareeb Saad, Mohamad Amin Hasbini
Gaza cybergang, where’s your IR team?
Molerats
2015-08-06CrowdStrikeAdam Kozy, Johannes Gilger
Bringing A Cannon To A Knife Fight
2015-08-06CrowdStrikeAdam Kozy, Johannes Gilger
Bringing A Cannon To A Knife Fight
2015-07-30ESET ResearchAnton Cherepanov, Robert Lipovsky
Operation Potao Express: Analysis of a cyber‑espionage toolkit
FakeTC
2015-07-30ESET ResearchAnton Cherepanov, Robert Lipovsky
Operation Potao Express: Analysis of a cyber‑espionage toolkit
FakeTC