Click here to download all references as Bib-File.

Enter keywords to filter the library entries below or Propose new Entry
2013-08-23FireEyeNart Villeneuve, Ned Moran, Thoufique Haq
Operation Molerats: Middle East Cyber Attacks Using Poison Ivy
Poison Ivy Molerats
2013-08-12FireEyeNart Villeneuve, Ned Moran
Survival of the Fittest: New York Times Attackers Evolve Quickly
yayih
2013-08-07RSALimor Kessem
Thieves Reaching for Linux—”Hand of Thief” Trojan Targets Linux #INTH3WILD
Hand of Thief
2013-08-01MalwarebytesJoshua Cannell
Sophos Discovers ZeroAccess Using RLO
ZeroAccess
2013-07-25MalwarebytesJoshua Cannell
ZeroAccess uses Self-Debugging
ZeroAccess
2013-07-22AvastPeter Kálnai
Multisystem Trojan Janicab attacks Windows and MacOSX via scripts
Janicab
2013-07-19BlackHatJason Geffner
End-to-End Analysis of a Domain Generating Algorithm Malware Family
SuppoBox
2013-07-15F-SecureBroderick Aquilino
Signed Mac Malware Using Right-to-Left Override Trick
Janicab
2013-06-26SymantecSymantec Security Response
Four Years of DarkSeoul Cyberattacks Against South Korea Continue on Anniversary of Korean War
Lazarus Group
2013-06-26SymantecSecurity Response
Four Years of DarkSeoul Cyberattacks Against South Korea Continue on Anniversary of Korean War
Lazarus Group
2013-06-19AvastJaromír Hořejší
Your Facebook connection is now secured! Thank you for your support!
SuppoBox
2013-06-17DARKReadingMathew J. Schwartz
CrowdStrike Falcon Traces Attacks Back To Hackers
BIG PANDA
2013-06-07Rapid7 LabsClaudio Guarnieri, Mark Schloesser
KeyBoy, Targeted Attacks against Vietnam and India
KeyBoy APT23
2013-06-04Kaspersky LabsGReAT
“NetTraveler is Running!” – Red Star APT Attacks Compromise High-Profile Victims
APT21
2013-05-29CIRCLCIRCL
Malware analysis report of a Backdoor.Snifula variant
Snifula
2013-05-22F-Secure LabsSean
Mac Spyware: OSX/KitM (Kumar in the Mac)
Kitmos
2013-05-20AvastThreat Intelligence Team
Lockscreen Win32:Lyposit displayed as a fake MacOs app
Lyposit
2013-04-26ESET ResearchPierre-Marc Bureau
Linux/Cdorked.A: New Apache backdoor being used in the wild to serve Blackhole
CDorked
2013-04-01VISAVISA
Payment Processing Threats Impacting Grocery Store Merchants
Apocalipto
2013-03-27Malware.luPaul Rascagnères
APT1: technical backstage
Terminator RAT