Click here to download all references as Bib-File.

Enter keywords to filter the library entries below or Propose new Entry
2015-07-01FireEyeFireEye Threat Intelligence
HAMMERTOSS: Stealthy Tactics Define a Russian Cyber Threat Group
tDiscoverer APT29
2015-06-24SpiceworksChris Miller
Stealthy Cyberespionage Campaign Attacks With Social Engineering
NanHaiShu
2015-06-23ReutersJoseph Menn, Sarah N. Lynch
Exclusive: SEC hunts hackers who stole corporate emails to trade stocks
WOLF SPIDER
2015-06-22Kaspersky LabsDmitry Tarakanov
Games are over: Winnti is now targeting pharmaceutical companies
Winnti APT41
2015-06-19London South EastAlliance News
Russian Hackers Suspected In Cyberattack On German Parliament
APT28
2015-06-19Netzpolitik.orgClaudio Guarnieri
Digital Attack on German Parliament: Investigative Report on the Hack of the Left Party Infrastructure in Bundestag
XTunnel APT28
2015-06-19London South EastLondon South East
Russian Hackers Suspected In Cyberattack On German Parliament
2015-06-15KrebsOnSecurityBrian Krebs
Catching Up on the OPM Breach
APT19
2015-06-10Kaspersky LabsGReAT
The Mystery of Duqu 2.0: a sophisticated cyberespionage actor returns
DuQu Unit 8200
2015-06-03ClearSkyClearSky Research Team
Thamar Reservoir – An Iranian cyber-attack campaign against targets in the Middle East
Rocket Kitten
2015-06-03ClearSkyClearSky Research Team
Thamar Reservoir – An Iranian cyber-attack campaign against targets in the Middle East
SamSam
2015-06-01CrowdStrikeAdam Kozy
Rhetoric Foreshadows Cyber Activity in the South China Sea
APT23
2015-06-01Trend MicroJay Yaneza
MalumPOS History and Characteristics
MalumPOS
2015-05-17CERT.PLMaciej Kotowicz
Newest addition to a happy family: KBOT
Bolek
2015-05-15Brian Krebs
Carefirst Blue Cross Breach Hits 1.1M
APT19
2015-05-13CylanceJon Gross
Cylance SPEAR Team: A Threat Actor Resurfaces
GreenShaitan
2015-05-10NextGovAliya Sternstein
Third-Party Software Was Entry Point for Background-Check System Hack
APT19
2015-05-02Barry Vengerik, Jonathan Wrolstad, Jordan Berry, Kristen Dennesen
HACKING THE STREET? FIN4 LIKELY PLAYING THE MARKET
WOLF SPIDER
2015-05-01FireEyeFireEye
HIDING IN PLAIN SIGHT: FIREEYE AND MICROSOFT EXPOSE OBFUSCATION TACTIC
BLACKCOFFEE
2015-04-27PWCTom Lancaster
Attacks against Israeli & Palestinian interests
Molerats