Click here to download all references as Bib-File.

Enter keywords to filter the library entries below or Propose new Entry
2015-04-27Cisco TalosAndrea Allievi, Earl Carter, Emmanuel Tacheau
Threat Spotlight: TeslaCrypt – Decrypt It Yourself
TeslaCrypt
2015-04-18FireEyeChris Phillips, Corbin Souffrant, Dan Caselden, Darien Kin, Genwei Jiang, James “Tom” Bennett, Jonathan Wrolstad, Joshua Homan, Yasir Khalid
Operation RussianDoll: Adobe & Windows Zero-Day Exploits Likely Leveraged by Russia’s APT28 in Highly-Targeted Attack
APT28
2015-04-15Kaspersky LabsCostin Raiu, Maxim Golovkin
The Chronicles of the Hellsing APT: the Empire Strikes Back
GRILLMARK Hellsing
2015-04-15Kaspersky LabsCostin Raiu, Maxim Golovkin
The Chronicles of the Hellsing APT: the Empire Strikes Back
Hellsing
2015-04-15Ars TechnicaDan Goodin
Elite cyber crime group strikes back after attack by rival APT gang
APT15
2015-04-14Palo Alto Networks Unit 42Jen Miller-Osborn, Josh Grunzweig
Unit 42 Identifies New DragonOK Backdoor Malware Deployed Against Japanese Targets
DragonOK
2015-04-14Palo Alto Networks Unit 42Jen Miller-Osborn, Josh Grunzweig
Unit 42 Identifies New DragonOK Backdoor Malware Deployed Against Japanese Targets
FormerFirstRAT
2015-04-13CrowdStrikeDmitri Alperovitch
Cyber Deterrence in Action? A story of one long HURRICANE PANDA campaign
HURRICANE PANDA
2015-04-13CrowdStrikeDmitri Alperovitch
Cyber Deterrence in Action? A story of one long HURRICANE PANDA campaign
HURRICANE PANDA
2015-04-09ESET ResearchJean-Ian Boutin
Operation Buhtrap, the trap for Russian accountants
Buhtrap BuhTrap
2015-03-30Trend MicroCedric Pernet, Dark Luo
Fake Judicial Spam Leads to Backdoor with Fake Certificate Authority
GootKit
2015-03-28Github (hfiref0x)hfiref0x
UACME
UACMe
2015-03-19Muhammad Junaid Bohio
Analyzing a Backdoor/Bot forthe MIPS Platform
TheMoon
2015-03-18Seattle TimesMike Baker
Feds warned Premera about security flaws before breach
APT19
2015-02-27ThreatConnectThreatConnect Research Team
The Anthem Hack: All Roads Lead to China
HttpBrowser
2015-02-27ThreatConnectThreatConnect Research Team
The Anthem Hack: All Roads Lead to China
Derusbi
2015-02-19Security AffairsPierluigi Paganini
Arid Viper – Israel entities targeted by malware packaged with sex video
AridViper
2015-02-18Trend MicroTrendmicro
Sexually Explicit Material Used as Lures in Recent Cyber Attacks
AridViper
2015-02-17AvastJan Širmer
Angry Android hacker hides Xbot malware in popular application icons
Xbot
2015-02-17Kaspersky LabsGhareeb Saad, Mohamad Amin Hasbini
The Desert Falcons targeted attacks
AridViper