Click here to download all references as Bib-File.

Enter keywords to filter the library entries below or Propose new Entry
2009-07-08The GuardianMatthew Weaver
Cyber attackers target South Korea and US
Lazarus Group
2009-03-28Infinitum LabsInformation Warfare Monitor
Tracking GhostNet: Investigating a Cyber Espionage Network
Ghost RAT GhostNet
2008-05-18ThreatExpertSergei Shevchenko
Rustock.C – Unpacking a Nested Doll
Rustock
2008-01-07Royal Air ForceMenwith Hill Station
4th Party Collection: Taking Advantage of Non-Partner Computer Network Exploitation Activity
2008-01-01Dr.WebVyacheslav Rusakoff
Win32.Ntldrbot (aka Rustock.C) no longer a myth, no longer a threat
Rustock
2007-10-01Arbor NetworksJose Nazario
BlackEnergy DDoS Bot Analysis
BlackEnergy
2007-03-20SecureworksDon Jackson
Gozi Trojan
Gozi
2004-04-15SANS GIACMatt Goldencrown
MyDoom is Your Doom: An Analysis of the MyDoom Virus
MyDoom
2004-01-01GIACSrinivas Ganti
MyDoom and its backdoor
MyDoom
2001-06-27The Wall Street JournalTed Bridis
Net Espionage Rekindles Tensions As U.S. Tries to Identify Hackers
1997-09-01Phrack Magazinedaemon9
LOKI2 (the implementation)
1900-01-01Security AffairsPierluigi Paganini
Hackers Broke Into the Celeb London Bridge Plastic Surgery Clinic
TheDarkOverlord