Click here to download all references as Bib-File.

Enter keywords to filter the library entries below or Propose new Entry
2015-11-02Virus BulletinFloser Bacurio Jr., Wayne Low
Shifu – the rise of a self-destructive banking trojan
Shifu
2015-11-02CyS CentrumCyS Centrum Incident Response Team
Modular trojan for hidden access to a computer
LatentBot
2015-10-26SymantecA L Johnson
Duuzer back door Trojan targets South Korea to take over computers
Brambul Duuzer Joanap Lazarus Group
2015-10-26SymantecSymantec Security Response
Duuzer back door Trojan targets South Korea to take over computers
Lazarus Group
2015-10-22Trend MicroFeike Hacquebord
Pawn Storm Targets MH17 Investigation Team
APT28
2015-10-16Palo Alto Networks Unit 42Rob Downs
Surveillance Malware Trends: Tracking Predator Pain and HawkEye
HawkEye Keylogger
2015-10-13DARKReadingKelly Jackson Higgins
Prolific Cybercrime Gang Favors Legit Login Credentials
FIN5
2015-10-13Trend MicroBrooks Li, Feike Hacquebord, Peter Pi
New Adobe Flash Zero-Day Used in Pawn Storm Campaign Targeting Foreign Affairs Ministries
APT28
2015-10-13Trend MicroBrooks Li, Feike Hacquebord, Peter Pi
New Adobe Flash Zero-Day Used in Pawn Storm Campaign Targeting Foreign Affairs Ministries
Seduploader
2015-10-09Palo Alto Networks Unit 42Josh Grunzweig
Latest TeslaCrypt Ransomware Borrows Code From Carberp Trojan
TeslaCrypt
2015-10-08CylanceBrian Wallace
A Study in Bots: DiamondFox
DiamondFox
2015-10-07Dell SecureworksDell Secureworks CTU
Hacker Group Creates Network of Fake LinkedIn Profiles
Cleaver
2015-10-07SecureworksCTU Research Team
Hacker Group Creates Network of Fake LinkedIn Profiles
Cleaver Cutting Kitten
2015-10-06ThreatpostMichael Mimoso
Targeted Attack Exposes OWA Weakness
owaauth
2015-09-23SpiderLabs BlogRodel Mendrez
Quaverse RAT: Remote-Access-as-a-Service
QRat
2015-09-23Palo Alto Networks Unit 42Jen Miller-Osborn, Robert Falcone
Chinese Actors Use ‘3102’ Malware in Attacks on US Government and EU Media
9002 RAT
2015-09-23Palo Alto Networks Unit 42Jen Miller-Osborn, Robert Falcone
Chinese Actors Use ‘3102’ Malware in Attacks on US Government and EU Media
APT.3102
2015-09-18ProofpointProofpoint Staff
Operation Arid Viper Slithers Back into View
AridViper
2015-09-17Trend MicroTrendmicro
Operation Iron Tiger: Exploring Chinese Cyber-Espionage Attacks on United States Defense Contractors
APT27
2015-09-16Trend MicroChristopher Budd
Operation Iron Tiger: Attackers Shift from East Asia to the United States
APT27