Click here to download all references as Bib-File.

Enter keywords to filter the library entries below or Propose new Entry
2015-06-01Trend MicroJay Yaneza
MalumPOS History and Characteristics
MalumPOS
2015-05-17CERT.PLMaciej Kotowicz
Newest addition to a happy family: KBOT
Bolek
2015-05-15Brian Krebs
Carefirst Blue Cross Breach Hits 1.1M
APT19
2015-05-13CylanceJon Gross
Cylance SPEAR Team: A Threat Actor Resurfaces
GreenShaitan
2015-05-10NextGovAliya Sternstein
Third-Party Software Was Entry Point for Background-Check System Hack
APT19
2015-05-02Barry Vengerik, Jonathan Wrolstad, Jordan Berry, Kristen Dennesen
HACKING THE STREET? FIN4 LIKELY PLAYING THE MARKET
WOLF SPIDER
2015-05-01FireEyeFireEye
HIDING IN PLAIN SIGHT: FIREEYE AND MICROSOFT EXPOSE OBFUSCATION TACTIC
BLACKCOFFEE
2015-04-27PWCTom Lancaster
Attacks against Israeli & Palestinian interests
Molerats
2015-04-27Cisco TalosAndrea Allievi, Earl Carter, Emmanuel Tacheau
Threat Spotlight: TeslaCrypt – Decrypt It Yourself
TeslaCrypt
2015-04-18FireEyeChris Phillips, Corbin Souffrant, Dan Caselden, Darien Kin, Genwei Jiang, James “Tom” Bennett, Jonathan Wrolstad, Joshua Homan, Yasir Khalid
Operation RussianDoll: Adobe & Windows Zero-Day Exploits Likely Leveraged by Russia’s APT28 in Highly-Targeted Attack
APT28
2015-04-15Kaspersky LabsCostin Raiu, Maxim Golovkin
The Chronicles of the Hellsing APT: the Empire Strikes Back
GRILLMARK Hellsing
2015-04-15Kaspersky LabsCostin Raiu, Maxim Golovkin
The Chronicles of the Hellsing APT: the Empire Strikes Back
Hellsing
2015-04-15Ars TechnicaDan Goodin
Elite cyber crime group strikes back after attack by rival APT gang
APT15
2015-04-14Palo Alto Networks Unit 42Jen Miller-Osborn, Josh Grunzweig
Unit 42 Identifies New DragonOK Backdoor Malware Deployed Against Japanese Targets
DragonOK
2015-04-14Palo Alto Networks Unit 42Jen Miller-Osborn, Josh Grunzweig
Unit 42 Identifies New DragonOK Backdoor Malware Deployed Against Japanese Targets
FormerFirstRAT
2015-04-13CrowdStrikeDmitri Alperovitch
Cyber Deterrence in Action? A story of one long HURRICANE PANDA campaign
HURRICANE PANDA
2015-04-13CrowdStrikeDmitri Alperovitch
Cyber Deterrence in Action? A story of one long HURRICANE PANDA campaign
HURRICANE PANDA
2015-04-09ESET ResearchJean-Ian Boutin
Operation Buhtrap, the trap for Russian accountants
Buhtrap BuhTrap
2015-03-30Trend MicroCedric Pernet, Dark Luo
Fake Judicial Spam Leads to Backdoor with Fake Certificate Authority
GootKit
2015-03-28Github (hfiref0x)hfiref0x
UACME
UACMe