Click here to download all references as Bib-File.•
2014-05-30
⋅
Malwarebytes
⋅
Taking off the Blackshades BlackShades |
2014-05-29
⋅
The Washington Times
⋅
Iranian hackers sucker punch U.S. defense officials with creative social-media scam Charming Kitten |
2014-05-19
⋅
The New York Times
⋅
5 in China Army Face U.S. Charges of Cyberattacks APT1 |
2014-05-15
⋅
Dr.Web
⋅
DDoS Trojans attack Linux MrBlack |
2014-05-13
⋅
CrowdStrike
⋅
Cat Scratch Fever: CrowdStrike Tracks Newly Reported Iranian Actor as FLYING KITTEN Flying Kitten |
2014-05-01
⋅
Arbor Networks
⋅
Into the Light of Day:Uncovering Ongoing and Historical Point of Sale Malware and Attack Campaigns poscardstealer |
2014-04-21
⋅
Wikipedia
⋅
Hacking Team Hacking Team |
2014-04-09
⋅
Dr.Web
⋅
BackDoor.Gootkit.112—a new multi-purpose backdoor GootKit |
2014-03-25
⋅
FireEye
⋅
Spear Phishing the News Cycle: APT Actors Leverage Interest in the Disappearance of Malaysian Flight MH 370 APT30 Naikon |
2014-03-13
⋅
Threatpost
⋅
Energy Watering Hole Attack Used LightsOut Exploit Kit ENERGETIC BEAR |
2014-03-12
⋅
Blog (Artem Baranov)
⋅
Uroburos: the snake rootkit Uroburos |
2014-03-06
⋅
Trend Micro
⋅
The Siesta Campaign: A New Targeted Attack Awakens APT1 |
2014-03-01
⋅
Vinsula
⋅
ChewBacca – A TOR Based POS Malware ChewBacca |
2014-02-03
⋅
Virus Bulletin
⋅
Needle in a haystack Evasive Panda |
2014-02-02
⋅
Department of Justice
⋅
U.S. Leads Multi-National Action Against “Gameover Zeus” Botnet and “Cryptolocker” Ransomware, Charges Botnet Administrator CryptoLocker |
2014-01-21
⋅
Sophos Naked Security
⋅
Digitally signed data-stealing malware targets Mac users in “undelivered courier item” attack Laoshu |
2014-01-14
⋅
Kaspersky Labs
⋅
The Icefog APT Hits US Targets With Java Backdoor DAGGER PANDA |
2014-01-01
⋅
Council on Foreign Relations
⋅
Operation Cleaver Cleaver |
2014-01-01
⋅
Airbus Defence & Space
⋅
The Eye of the Tiger paladin PittyTiger RAT |
2014-01-01
⋅
Trend Micro
⋅
Targeted Attack Trends in Asia-Pacific Elise |