Click here to download all references as Bib-File.

Enter keywords to filter the library entries below or Propose new Entry
2016-10-03Kaspersky LabsKurt Baumgartner
On the StrongPity Waterhole Attacks Targeting Italian and Belgian Encryption Users
StrongPity
2016-10-01Vice MotherboardJanus Rose
‘Shadow Brokers’ Whine That Nobody Is Buying Their Hacked NSA Files
The Shadow Brokers
2016-09-30Bleeping ComputerLawrence Abrams
Hacked Steam accounts spreading Remote Access Trojan
NetSupportManager RAT
2016-09-28ForcepointNicholas Griffin
Highly Evasive Code Injection Awaits User Interaction Before Delivering Malware
BuhTrap
2016-09-27MalwarebytesThomas Reed
Komplex Mac backdoor answers old questions
Komplex
2016-09-26Palo Alto Networks Unit 42Dani Creus, Robert Falcone, Tyler Halfpop
Sofacy’s ‘Komplex’ OS X Trojan
APT28
2016-09-26Palo Alto Networks Unit 42Dani Creus, Robert Falcone, Tyler Halfpop
Sofacy’s ‘Komplex’ OS X Trojan
Komplex
2016-09-23SecurityIntelligenceDave McMillen
Dissecting a Hacktivist’s DDoS Tool: Saphyra Revealed
Saphyra
2016-09-23FireEyeAnkit Anubhav, Dileep Kumar Jallepalli
Hancitor (AKA Chanitor) observed using multiple attack approaches
Hancitor
2016-09-23Laanwj's Blog@orionwl
SECONDDATE in action
Equationgroup (Sorting)
2016-09-22ESET ResearchAnton Cherepanov
Book of Eli: African targeted attacks
Book of Eli
2016-09-20Deutsche Welleipj, kl
Hackers lurking, parliamentarians told
APT28
2016-09-20Deutsche WelleDeutsche Welle
Hackers lurking, parliamentarians told
2016-09-15Palo Alto Networks Unit 42Kaoru Hayashi
MILE TEA: Cyber Espionage Campaign Targets Asia Pacific Businesses and Government Agencies
Elirks Logedrut Micrass
2016-09-11Softpedia NewsCatalin Cimpanu
Free Darktrack RAT Has the Potential of Being the Best RAT on the Market Search
Darktrack RAT
2016-09-09InfoArmorAndrew Komarov
GOVRAT V2.0 - Attacking US military and government
GovRAT
2016-09-07Virus BulletinBrian Bartholomew, Juan Andrés Guerrero-Saade
Wave Your False Flags! Deception Tactics Muddying Attribution in Targeted Attacks
DuQu JripBot Sinowal Stuxnet Wipbot
2016-09-07Kaspersky LabsStefan Ortloff
The Missing Piece – Sophisticated OS X Backdoor Discovered
Mokes
2016-09-07Twitter (smoothimpact)Kris McConkey
Tweet with hashes on APT3
APT3 Keylogger
2016-09-06KZ CERTKZ CERT
KZ-CERT has analyzed another sample of malicious software, which is a component of targeted attacks (Targeted attacks, Advanced Persistent Threats (APT))
Icefog