Click here to download all references as Bib-File.

Enter keywords to filter the library entries below or Propose new Entry
2016-09-20Deutsche WelleDeutsche Welle
Hackers lurking, parliamentarians told
2016-09-15Palo Alto Networks Unit 42Kaoru Hayashi
MILE TEA: Cyber Espionage Campaign Targets Asia Pacific Businesses and Government Agencies
Elirks Logedrut Micrass
2016-09-11Softpedia NewsCatalin Cimpanu
Free Darktrack RAT Has the Potential of Being the Best RAT on the Market Search
Darktrack RAT
2016-09-09InfoArmorAndrew Komarov
GOVRAT V2.0 - Attacking US military and government
GovRAT
2016-09-07Virus BulletinBrian Bartholomew, Juan Andrés Guerrero-Saade
Wave Your False Flags! Deception Tactics Muddying Attribution in Targeted Attacks
DuQu JripBot Sinowal Stuxnet Wipbot
2016-09-07Kaspersky LabsStefan Ortloff
The Missing Piece – Sophisticated OS X Backdoor Discovered
Mokes
2016-09-07Twitter (smoothimpact)Kris McConkey
Tweet with hashes on APT3
APT3 Keylogger
2016-09-06KZ CERTKZ CERT
KZ-CERT has analyzed another sample of malicious software, which is a component of targeted attacks (Targeted attacks, Advanced Persistent Threats (APT))
Icefog
2016-08-29FortinetFloser Bacurio Jr., Joie Salvio
German Speakers Targeted by SPAM Leading to Ozone RAT
Ozone RAT
2016-08-25MalwarebytesMalwarebytes Labs
Unpacking the spyware disguised as antivirus
PlugX
2016-08-23International Business TimesHyacinth Mascarenhas
Russian hackers 'Fancy Bear' likely breached Olympic drug-testing agency and DNC, experts say
APT28
2016-08-23International Business TimesHyacinth Mascarenhas
Russian hackers 'Fancy Bear' likely breached Olympic drug-testing agency and DNC, experts say
2016-08-17Kaspersky LabsMohamad Amin Hasbini
Operation Ghoul: targeted attacks on industrial and engineering organizations
OpGhoul Operation Ghoul
2016-08-17Kaspersky LabsMohamad Amin Hasbini
Operation Ghoul: targeted attacks on industrial and engineering organizations
OpGhoul
2016-08-10CERT.PLKamil Frankowicz
CryptXXX \ CrypMIC – intensywnie dystrybuowany ransomware w ramach exploit-kitów
CrypMic CryptXXXX
2016-08-08Kaspersky LabsGReAT
ProjectSauron: top level cyber-espionage platform covertly extracts encrypted government comms
ProjectSauron
2016-08-08SymantecSymantec
Backdoor.Remsec indicators of compromise
Remsec
2016-08-04SecurityWeekSecurityWeek News
Iranian Actor "Group5" Targeting Syrian Opposition
Group5
2016-08-01CrowdStrikeAdam Meyers
CrowdStrike’s New Methodology for Tracking eCrime
Corebot BOSON SPIDER
2016-08-01UperesiaFelix Weyne
Analysis of a packed Pony downloader
Pony