Click here to download all references as Bib-File.•
2015-06-01
⋅
Trend Micro
⋅
MalumPOS History and Characteristics MalumPOS |
2015-05-17
⋅
CERT.PL
⋅
Newest addition to a happy family: KBOT Bolek |
2015-05-15
⋅
Carefirst Blue Cross Breach Hits 1.1M APT19 |
2015-05-13
⋅
Cylance
⋅
Cylance SPEAR Team: A Threat Actor Resurfaces GreenShaitan |
2015-05-10
⋅
NextGov
⋅
Third-Party Software Was Entry Point for Background-Check System Hack APT19 |
2015-05-02
⋅
HACKING THE STREET? FIN4 LIKELY PLAYING THE MARKET WOLF SPIDER |
2015-05-01
⋅
FireEye
⋅
HIDING IN PLAIN SIGHT: FIREEYE AND MICROSOFT EXPOSE OBFUSCATION TACTIC BLACKCOFFEE |
2015-04-27
⋅
PWC
⋅
Attacks against Israeli & Palestinian interests Molerats |
2015-04-27
⋅
Cisco Talos
⋅
Threat Spotlight: TeslaCrypt – Decrypt It Yourself TeslaCrypt |
2015-04-18
⋅
FireEye
⋅
Operation RussianDoll: Adobe & Windows Zero-Day Exploits Likely Leveraged by Russia’s APT28 in Highly-Targeted Attack APT28 |
2015-04-15
⋅
Kaspersky Labs
⋅
The Chronicles of the Hellsing APT: the Empire Strikes Back GRILLMARK Hellsing |
2015-04-15
⋅
Kaspersky Labs
⋅
The Chronicles of the Hellsing APT: the Empire Strikes Back Hellsing |
2015-04-15
⋅
Ars Technica
⋅
Elite cyber crime group strikes back after attack by rival APT gang APT15 |
2015-04-14
⋅
Palo Alto Networks Unit 42
⋅
Unit 42 Identifies New DragonOK Backdoor Malware Deployed Against Japanese Targets DragonOK |
2015-04-14
⋅
Palo Alto Networks Unit 42
⋅
Unit 42 Identifies New DragonOK Backdoor Malware Deployed Against Japanese Targets FormerFirstRAT |
2015-04-13
⋅
CrowdStrike
⋅
Cyber Deterrence in Action? A story of one long HURRICANE PANDA campaign HURRICANE PANDA |
2015-04-13
⋅
CrowdStrike
⋅
Cyber Deterrence in Action? A story of one long HURRICANE PANDA campaign HURRICANE PANDA |
2015-04-09
⋅
ESET Research
⋅
Operation Buhtrap, the trap for Russian accountants Buhtrap BuhTrap |
2015-03-30
⋅
Trend Micro
⋅
Fake Judicial Spam Leads to Backdoor with Fake Certificate Authority GootKit |
2015-03-28
⋅
Github (hfiref0x)
⋅
UACME UACMe |