Click here to download all references as Bib-File.

Enter keywords to filter the library entries below or Propose new Entry
2016-04-26MicrosoftWindows Defender Advanced Threat Hunting Team
PLATINUM Targeted attacks in South and Southeast Asia
AMTsol PLATINUM
2016-03-28FireEyeNart Villeneuve
TREASUREHUNT: A Custom POS Malware Tool
TreasureHunter
2015-06-23ReutersJoseph Menn, Sarah N. Lynch
Exclusive: SEC hunts hackers who stole corporate emails to trade stocks
WOLF SPIDER
2015-01-26CrowdStrikeAndy Schworer, Josh Liburdi
Storm Chasing: Hunting Hurricane Panda
HURRICANE PANDA
2014-11-14SensepostEtienne Stalmans, Sam Hunter, Willem Mouton
reGeorg
reGeorg
2014-09-05GoogleBilly Leonard, Neel Mehta, Shane Huntiey
Peering Into the Aquarium: Analysis of a Sophisticated Multi-Stage Malware Family
X-Agent
2014-08-14Palo Alto Networks Unit 42Unit 42 Team
Hunting the Mutex
Allaple
2014-06-23F-SecureDaavid
Havex Hunts For ICS/SCADA Systems
Havex RAT
2014-05-01Recorded FutureChris
Hunting Hidden Lynx: How OSINT is Crucial for APT Analysis
APT17
2011-07-04Kernelmode.info Forumsrkhunter
WinNT/Rovnix (alias Mayachok, Cidox, BkLoader)
Rovnix
2011-03-28KrebsOnSecurityBrian Krebs
Microsoft Hunting Rustock Controllers
Rustock