Click here to download all references as Bib-File.

Enter keywords to filter the library entries below or Propose new Entry
2012-09-07SymantecGavin O'Gorman, Geoff McDonald
The Elderwood Project
9002 RAT Beijing Group
2012-09-06SymantecGavin O'Gorman, Geoff McDonald
The Elderwood Project
Beijing Group
2012-08-20SymantecTakashi Katsuki
Crisis for Windows Sneaks onto Virtual Machines
Crisis RCS
2012-08-16SymantecSymantec Security Response
The Shamoon Attacks
DistTrack OilRig
2012-08-16SymantecSymantec Security Response
The Shamoon Attacks
OilRig
2012-08-08SymantecSymantec
Trojan.Mebroot
Sinowal
2012-07-18SymantecSecurity Response
The Madi Attacks: Series of Social Engineering Campaigns
Madi
2012-07-17SymantecSymantec Security Response
The Madi Attacks: Series of Social Engineering Campaigns
Madi
2012-05-31SymantecSecurity Response
Flamer: A Recipe for Bluetoothache
Flame
2012-03-01SymantecSymantec
The Luckycat Hackers
Lucky Cat
2012-02-22SymantecSymantec
Trojan.Ransomlock.J
Ransomlock
2012-02-15Security IntelligenceAmit Klein
Merchant of Fraud Returns: Shylock Polymorphic Financial Malware Infections on the Rise
Shylock
2012-01-01SymantecVarious
The Luckycat Hackers
Lucky Cat
2012-01-01SymantecNicolas Falliere
W32.Qakbot in Detail
QakBot
2011-12-08SymantecVikram Thakur
The Sykipot Attacks
sykipot
2011-11-23SymantecSymantec
W32.Duqu: The precursor to the next Stuxnet
DuQu
2011-09-09SymantecLivian Ge
BIOS Threat is Showing up Again!
Mebromi
2011-07-01SymantecNicolas Falliere
Sality: Story of a Peerto-Peer Viral Network
Sality
2011-06-29SymantecJohn McDonald
Inside a Back Door Attack
Ghost RAT Dust Storm
2011-06-29SymantecJohn McDonald
Inside a Back Door Attack
Dust Storm