Click here to download all references as Bib-File.•
2013-03-26
⋅
Contextis
⋅
PlugX–Payload Extraction PlugX |
2013-03-24
⋅
OSX/Pintsized Backdoor Additional Details PintSized |
2013-03-20
⋅
The New York Times
⋅
Computer Networks in South Korea Are Paralyzed in Cyberattacks Lazarus Group |
2013-03-20
⋅
Kaspersky Labs
⋅
The TeamSpy Crew Attacks – Abusing TeamViewer for Cyberespionage TeamSpy Crew |
2013-03-20
⋅
Researchers Uncover ‘TeamSpy’ Attack Campaign Against Government, Research Targets TeamSpy Crew |
2013-03-14
⋅
Kaspersky Labs
⋅
New Uyghur and Tibetan Themed Attacks Using PDF Exploits ItaDuke |
2013-03-04
⋅
Trend Micro
⋅
In-Depth Look: APT Attack Tools of the Trade HTran |
2013-02-25
⋅
WeLiveSecurity
⋅
Caphaw attacking major European banks using webinject plugin Shylock |
2013-02-22
⋅
Microsoft
⋅
Recent Cyberattacks WildNeutron |
2013-02-19
⋅
Symantec
⋅
APT1: Q&A on Attacks by the Comment Crew APT1 |
2013-02-19
⋅
Reuters
⋅
Exclusive: Apple, Macs hit by hackers who targeted Facebook WildNeutron |
2013-02-19
⋅
Symantec
⋅
APT1: Q&A on Attacks by the Comment Crew |
2013-02-15
⋅
Facebook
⋅
Protecting People On Facebook WildNeutron |
2013-02-08
⋅
VMWare Carbon Black
⋅
Bit9 and Our Customers’ Security APT17 |
2013-01-30
⋅
Backdoor.Barkiofork Targets Aerospace and Defense Industry barkiofork |
2013-01-24
⋅
ESET Research
⋅
Linux/SSHDoor.A Backdoored SSH daemon that steals passwords SSHDoor |
2013-01-18
⋅
abuse.ch
⋅
Feodo Tracker Emotet |
2013-01-14
⋅
Kaspersky Labs
⋅
“Red October” Diplomatic Cyber Attacks Investigation Inception Framework |
2013-01-14
⋅
Kaspersky Labs
⋅
"Red October" Diplomatic Cyber Attacks Investigation Inception Framework |
2013-01-02
⋅
Capstone Turbine Corporation Also Targeted in the CFR Watering Hole Attack And More APT19 |