Click here to download all references as Bib-File.•
2015-10-13
⋅
Trend Micro
⋅
New Adobe Flash Zero-Day Used in Pawn Storm Campaign Targeting Foreign Affairs Ministries Seduploader |
2015-10-09
⋅
Palo Alto Networks Unit 42
⋅
Latest TeslaCrypt Ransomware Borrows Code From Carberp Trojan TeslaCrypt |
2015-10-08
⋅
Cylance
⋅
A Study in Bots: DiamondFox DiamondFox |
2015-10-07
⋅
Dell Secureworks
⋅
Hacker Group Creates Network of Fake LinkedIn Profiles Cleaver |
2015-10-07
⋅
Secureworks
⋅
Hacker Group Creates Network of Fake LinkedIn Profiles Cleaver Cutting Kitten |
2015-10-06
⋅
Threatpost
⋅
Targeted Attack Exposes OWA Weakness owaauth |
2015-09-23
⋅
SpiderLabs Blog
⋅
Quaverse RAT: Remote-Access-as-a-Service QRat |
2015-09-23
⋅
Palo Alto Networks Unit 42
⋅
Chinese Actors Use ‘3102’ Malware in Attacks on US Government and EU Media 9002 RAT |
2015-09-23
⋅
Palo Alto Networks Unit 42
⋅
Chinese Actors Use ‘3102’ Malware in Attacks on US Government and EU Media APT.3102 |
2015-09-18
⋅
Proofpoint
⋅
Operation Arid Viper Slithers Back into View AridViper |
2015-09-17
⋅
Trend Micro
⋅
Operation Iron Tiger: Exploring Chinese Cyber-Espionage Attacks on United States Defense Contractors APT27 |
2015-09-16
⋅
Trend Micro
⋅
Operation Iron Tiger: Attackers Shift from East Asia to the United States APT27 |
2015-09-15
⋅
Proofpoint
⋅
In Pursuit of Optical Fibers and Troop Intel: Targeted Attack Distributes PlugX in Russia PlugX |
2015-09-11
⋅
⋅
MacMark
⋅
CSI MacMark: Janicab Janicab |
2015-09-11
⋅
Raytheon Blackbird Technologies
⋅
20150911-280-CSIT-15085 NfLog IsSpace |
2015-09-10
⋅
FireEye
⋅
Hangul Word Processor (HWP)Zero-Day: possible ties to North Korean threat actors HOPLIGHT |
2015-09-08
⋅
ESET Research
⋅
Carbanak gang is back and packing new guns DRIFTPIN |
2015-09-01
⋅
Trend Micro
⋅
The Spy Kittens Are Back:Rocket Kitten 2 Cleaver |
2015-09-01
⋅
Trend Micro
⋅
The Spy Kittens Are Back: Rocket Kitten 2 Rocket Kitten |
2015-09-01
⋅
Trend Micro
⋅
Attackers Target Organizations in Japan; Transform Local Sites into C&C Servers for EMDIVI Backdoor Emdivi |