Click here to download all references as Bib-File.

Enter keywords to filter the library entries below or Propose new Entry
2015-08-24DarkMattersBev Robb
Sphinx: New Zeus Variant for Sale on the Black Market
Zeus Sphinx
2015-08-20Kaspersky LabsSuguru Ishimaru
New activity of the Blue Termite APT
Blue Termite
2015-08-20Kaspersky LabsSuguru Ishimaru
New activity of the Blue Termite APT
Emdivi
2015-08-14Raytheon Blackbird TechnologiesRaytheon Blackbird Technologies
Stalker Panda
Tick
2015-08-12WikipediaVarious
Islamic State Hacking Division
Cyber Caliphate Army
2015-08-10Kaspersky LabsGReAT
Darkhotel’s attacks in 2015
DarkHotel DarkHotel
2015-08-06SymantecJon DiMaggio
The Black Vine cyberespionage group
Sakula RAT APT19
2015-08-06SymantecJon DiMaggio
The Black Vine cyberespionage group
2015-08-05Ars TechnicaSean Gallagher
Newly discovered Chinese hacking group hacked 100+ websites to use as “watering holes”
APT27
2015-08-05Black HatElliott Peterson, Michael Sandee, Tillmann Werner
Gameover Zeus – Bad Guys and Backends
Gameover P2P
2015-07-29Youtube (FireEye Inc.)FireEye
HAMMERTOSS: Stealthy Tactics Define a Russian Cyber Threat Group
tDiscoverer
2015-07-20paloalto Networks Unit 42Bryan Lee, Josh Grunzweig
Watering Hole Attack on Aerospace Firm Exploits CVE-2015-5122 to Install IsSpace Backdoor
IsSpace
2015-07-14Kaspersky LabsFedor Sinitsyn
TeslaCrypt 2.0 disguised as CryptoWall
TeslaCrypt
2015-07-10ESET ResearchESET Research
Sednit APT Group Meets Hacking Team
2015-07-08SymantecSymantec Security Response
Butterfly: Profiting from high-level corporate attacks
WildNeutron
2015-07-08Kaspersky LabsGReAT
Wild Neutron – Economic espionage threat actor returns with new tricks
JripBot
2015-07-08Kaspersky LabsGReAT
Wild Neutron – Economic espionage threat actor returns with new tricks
WildNeutron
2015-07-05ViceLorenzo Franceschi-Bicchierai
Spy Tech Company 'Hacking Team' Gets Hacked
Hacking Team
2015-07-01FireEyeFireEye Threat Intelligence
HAMMERTOSS: Stealthy Tactics Define a Russian Cyber Threat Group
tDiscoverer APT29
2015-06-24SpiceworksChris Miller
Stealthy Cyberespionage Campaign Attacks With Social Engineering
NanHaiShu