Click here to download all references as Bib-File.•
2013-08-23
⋅
FireEye
⋅
Operation Molerats: Middle East Cyber Attacks Using Poison Ivy Poison Ivy Molerats |
2013-08-12
⋅
FireEye
⋅
Survival of the Fittest: New York Times Attackers Evolve Quickly yayih |
2013-08-07
⋅
RSA
⋅
Thieves Reaching for Linux—”Hand of Thief” Trojan Targets Linux #INTH3WILD Hand of Thief |
2013-08-01
⋅
Malwarebytes
⋅
Sophos Discovers ZeroAccess Using RLO ZeroAccess |
2013-07-25
⋅
Malwarebytes
⋅
ZeroAccess uses Self-Debugging ZeroAccess |
2013-07-22
⋅
Avast
⋅
Multisystem Trojan Janicab attacks Windows and MacOSX via scripts Janicab |
2013-07-19
⋅
BlackHat
⋅
End-to-End Analysis of a Domain Generating Algorithm Malware Family SuppoBox |
2013-07-15
⋅
F-Secure
⋅
Signed Mac Malware Using Right-to-Left Override Trick Janicab |
2013-06-26
⋅
Symantec
⋅
Four Years of DarkSeoul Cyberattacks Against South Korea Continue on Anniversary of Korean War Lazarus Group |
2013-06-26
⋅
Symantec
⋅
Four Years of DarkSeoul Cyberattacks Against South Korea Continue on Anniversary of Korean War Lazarus Group |
2013-06-19
⋅
Avast
⋅
Your Facebook connection is now secured! Thank you for your support! SuppoBox |
2013-06-17
⋅
DARKReading
⋅
CrowdStrike Falcon Traces Attacks Back To Hackers BIG PANDA |
2013-06-07
⋅
Rapid7 Labs
⋅
KeyBoy, Targeted Attacks against Vietnam and India KeyBoy APT23 |
2013-06-04
⋅
Kaspersky Labs
⋅
“NetTraveler is Running!” – Red Star APT Attacks Compromise High-Profile Victims APT21 |
2013-05-29
⋅
CIRCL
⋅
Malware analysis report of a Backdoor.Snifula variant Snifula |
2013-05-22
⋅
F-Secure Labs
⋅
Mac Spyware: OSX/KitM (Kumar in the Mac) Kitmos |
2013-05-20
⋅
Avast
⋅
Lockscreen Win32:Lyposit displayed as a fake MacOs app Lyposit |
2013-04-26
⋅
ESET Research
⋅
Linux/Cdorked.A: New Apache backdoor being used in the wild to serve Blackhole CDorked |
2013-04-01
⋅
VISA
⋅
Payment Processing Threats Impacting Grocery Store Merchants Apocalipto |
2013-03-27
⋅
Malware.lu
⋅
APT1: technical backstage Terminator RAT |