Click here to download all references as Bib-File.

Enter keywords to filter the library entries below or Propose new Entry
2014-09-19Palo Alto Networks Unit 42Jen Miller-Osborn, Ryan Olson
Recent Watering Hole Attacks Attributed to APT Group “th3bug” Using Poison Ivy
Poison Ivy
2014-09-11BleepingComputer ForumsDecrypterFixer
TorrentLocker Ransomware Cracked and Decrypter has been made
TorrentLocker
2014-09-04FireEyeJames T. Bennett, Mike Scott
Forced to Adapt: XSLCmd Backdoor Now on OS X
XSLCmd APT15
2014-08-29Kaspersky LabsCostin Raiu, Roel Schouwenberg, Ryan Naraine
Sinkholing the Backoff POS Trojan
Backoff POS
2014-08-29Trend MicroRhena Inocencio
New BlackPOS Malware Emerges in the Wild, Targets Retail Accounts
BlackPOS
2014-08-29FireEyeKyle Wilhoit, Thoufique Haq
Connecting the Dots: Syrian Malware Team Uses BlackWorm for Attacks
Blackworm RAT
2014-08-28Trend MicroChristopher Daniel So
BIFROSE Now More Evasive Through Tor, Used for Targeted Attack
bifrose
2014-08-28AT&TJaime Blasco
Scanbox: A Reconnaissance Framework Used with Watering Hole Attacks
scanbox
2014-08-20Kaspersky LabsGReAT
“El Machete”
Machete El Machete
2014-08-19Michael Mimoso
APT Gang Branches Out to Medical Espionage in Community Health Breach
APT18
2014-08-08FireEyeFireEye
Sidewinder Targeted Attack Against Android in the Golden Age of AD Libraries
RAZOR TIGER
2014-08-07The GuardianTom Brewster
Sophisticated 'Turla' hackers spying on European governments, say researchers
Turla
2014-08-07NetScoutASERT Team
Innaput Actors Utilize Remote Access Trojan Since 2016, Presumably Targeting Victim Files
InnaputRAT
2014-07-15McAfeeMcAfee
Targeted Attacks on French Company Exploit Multiple Word Vulnerabilities
APT24
2014-07-15McAfeeMcAfee
Targeted Attacks on French Company Exploit Multiple Word Vulnerabilities
PittyTiger RAT
2014-07-11Airbus Defence & SpaceCedric Pernet, David Bizeul, Fabien Perigaud, Ivan Fontarensky, Ronan Mouchoux
The Eye of the Tiger
APT24
2014-07-10EuropolEuropol
Global Action Targeting Shylock Malware
Shylock
2014-07-07SymantecSecurity Response
Dragonfly: Cyberespionage Attacks Against Energy Suppliers
Karagany ENERGETIC BEAR
2014-07-07SymantecSymantec Security Response
Dragonfly: Cyberespionage Attacks Against Energy Suppliers
ENERGETIC BEAR
2014-07-02Trend MicroKervin Alintanahin, Ronnie Giagone
KIVARS With Venom: Targeted Attacks Upgrade with 64-bit “Support”
FakeWord KIVARS PLEAD Poison RAT Zeus