Click here to download all references as Bib-File.

Enter keywords to filter the library entries below or Propose new Entry
2015-07-05ViceLorenzo Franceschi-Bicchierai
Spy Tech Company 'Hacking Team' Gets Hacked
Hacking Team
2015-02-18Vice MotherboardLorenzo Franceschi-Bicchierai
Meet Babar, a New Malware Almost Certainly Created by France
SNOWGLOBE
2014-11-13Trend MicroRhena Inocencio
BASHLITE Affects Devices Running on BusyBox
Bashlite
2013-11-06CrowdStrikeAdam Meyers
VICEROY TIGER Delivers New Zero-Day Exploit
VICEROY TIGER
2013-08-25AusCERTParth Shukla
The Compromised Devices of the Carna Botnet
2012-11-16Github (DesignativeDave)DesignativeDave
Remote Administration Tool for Android devices
AndroRAT
2012-01-13Middle East OnlineMiddle East Online
Cyber war: 'Gaza hackers' deface Israel fire service website
Molerats
2011-10-26IntegoPeter James
Tsunami Backdoor Can Be Used for Denial of Service Attacks
Tsunami
2011-02-10McAfeeMcAfee Foundstone Professional Services, McAfee Labs
Global Energy Cyberattacks: “Night Dragon”
Night Dragon
2010-11-20InfoSec InstituteGiuseppe Bonfa
The Kernel-Mode Device Driver Stealth Rootkit
ZeroAccess
2010-11-16Giuseppe Bonfa
ZEROACCESS MALWARE - PART 3: The Device Driver Process Injection Rootkit
ZeroAccess