Click here to download all references as Bib-File.

Enter keywords to filter the library entries below or Propose new Entry
2013-03-26ContextisKevin O’Reilly
PlugX–Payload Extraction
PlugX
2013-03-24Eric Romang
OSX/Pintsized Backdoor Additional Details
PintSized
2013-03-20The New York TimesChoe Sang-Hun
Computer Networks in South Korea Are Paralyzed in Cyberattacks
Lazarus Group
2013-03-20Kaspersky LabsGReAT
The TeamSpy Crew Attacks – Abusing TeamViewer for Cyberespionage
TeamSpy Crew
2013-03-20Dennis Fisher
Researchers Uncover ‘TeamSpy’ Attack Campaign Against Government, Research Targets
TeamSpy Crew
2013-03-14Kaspersky LabsCostin Raiu, Igor Kuznetsov
New Uyghur and Tibetan Themed Attacks Using PDF Exploits
ItaDuke
2013-03-04Trend MicroKyle Wilhoit
In-Depth Look: APT Attack Tools of the Trade
HTran
2013-02-25WeLiveSecurityAleksandr Matrosov
Caphaw attacking major European banks using webinject plugin
Shylock
2013-02-22MicrosoftMicrosoft Security Response Center
Recent Cyberattacks
WildNeutron
2013-02-19SymantecA L Johnson
APT1: Q&A on Attacks by the Comment Crew
APT1
2013-02-19ReutersJim Finkle, Joseph Menn
Exclusive: Apple, Macs hit by hackers who targeted Facebook
WildNeutron
2013-02-19SymantecSymantec Security Response
APT1: Q&A on Attacks by the Comment Crew
2013-02-15FacebookFacebook
Protecting People On Facebook
WildNeutron
2013-02-08VMWare Carbon BlackPatrick Morley
Bit9 and Our Customers’ Security
APT17
2013-01-30Joseph Bingham
Backdoor.Barkiofork Targets Aerospace and Defense Industry
barkiofork
2013-01-24ESET ResearchSébastien Duquette
Linux/SSHDoor.A Backdoored SSH daemon that steals passwords
SSHDoor
2013-01-18abuse.chabuse.ch
Feodo Tracker
Emotet
2013-01-14Kaspersky LabsGReAT
“Red October” Diplomatic Cyber Attacks Investigation
Inception Framework
2013-01-14Kaspersky LabsGReAT
"Red October" Diplomatic Cyber Attacks Investigation
Inception Framework
2013-01-02Eric Romang
Capstone Turbine Corporation Also Targeted in the CFR Watering Hole Attack And More
APT19