Click here to download all references as Bib-File.

Enter keywords to filter the library entries below or Propose new Entry
2014-05-30MalwarebytesAdam Kujawa
Taking off the Blackshades
BlackShades
2014-05-29The Washington TimesCheryl K. Chumley
Iranian hackers sucker punch U.S. defense officials with creative social-media scam
Charming Kitten
2014-05-19The New York TimesDavid E. Sanger, Michael S. Schmidt
5 in China Army Face U.S. Charges of Cyberattacks
APT1
2014-05-15Dr.WebDr. Web
DDoS Trojans attack Linux
MrBlack
2014-05-13CrowdStrikeMatt Dahl
Cat Scratch Fever: CrowdStrike Tracks Newly Reported Iranian Actor as FLYING KITTEN
Flying Kitten
2014-05-01Arbor NetworksASERT Threat Intelligence
Into the Light of Day:Uncovering Ongoing and Historical Point of Sale Malware and Attack Campaigns
poscardstealer
2014-04-21WikipediaVarious
Hacking Team
Hacking Team
2014-04-09Dr.WebDr.Web
BackDoor.Gootkit.112—a new multi-purpose backdoor
GootKit
2014-03-25FireEyeAlex Lanstein, Ned Moran
Spear Phishing the News Cycle: APT Actors Leverage Interest in the Disappearance of Malaysian Flight MH 370
APT30 Naikon
2014-03-13Threatpost2014-03-13
Energy Watering Hole Attack Used LightsOut Exploit Kit
ENERGETIC BEAR
2014-03-12Blog (Artem Baranov)Andrzej Dereszowski, Matthieu Kaczmarek
Uroburos: the snake rootkit
Uroburos
2014-03-06Trend MicroMaharlito Aquino
The Siesta Campaign: A New Targeted Attack Awakens
APT1
2014-03-01VinsulaIvo Ivanov
ChewBacca – A TOR Based POS Malware
ChewBacca
2014-02-03Virus BulletinGabor Szappanos
Needle in a haystack
Evasive Panda
2014-02-02Department of JusticeOffice of Public Affairs
U.S. Leads Multi-National Action Against “Gameover Zeus” Botnet and “Cryptolocker” Ransomware, Charges Botnet Administrator
CryptoLocker
2014-01-21Sophos Naked SecurityPaul Ducklin
Digitally signed data-stealing malware targets Mac users in “undelivered courier item” attack
Laoshu
2014-01-14Kaspersky LabsCostin Raiu, Igor Soumenkov, Vitaly Kamluk
The Icefog APT Hits US Targets With Java Backdoor
DAGGER PANDA
2014-01-01Council on Foreign RelationsCyber Operations Tracker
Operation Cleaver
Cleaver
2014-01-01Airbus Defence & SpaceCedric Pernet, David Bizeul, Fabien Perigaud, Ivan Fontarensky, Ronan Mouchoux
The Eye of the Tiger
paladin PittyTiger RAT
2014-01-01Trend MicroUnknownUnknown
Targeted Attack Trends in Asia-Pacific
Elise