Click here to download all references as Bib-File.

Enter keywords to filter the library entries below or Propose new Entry
2014-12-18The Washington PostChristian Davenport
KeyPoint network breach could affect thousands of federal workers
APT19
2014-12-10Kaspersky LabsGReAT
Cloud Atlas: RedOctober APT is back in style
Inception Framework
2014-12-10Kaspersky LabsGReAT
Cloud Atlas: RedOctober APT is back in style
Inception Framework
2014-12-09Blue CoatSnorre Fagerland, Waylon Grange
Blue Coat Exposes “The Inception Framework”; Very Sophisticated, Layered Malware Attack Targeted at Military, Diplomats, and Business Execs
CloudAtlas Inception Framework
2014-12-09SymantecWaylon Grange
Blue Coat Exposes “The Inception Framework”; Very Sophisticated, Layered Malware Attack Targeted at Military, Diplomats, and Bus
Inception Framework
2014-12-08Trend MicroTrend Micro
The Hack of Sony Pictures: What We Know and What You Need to Know
Lazarus Group
2014-11-25Kaspersky LabsBrain Donohue
Regin APT Attacks Among the Most Sophisticated Ever Analyzed
Regin
2014-11-19Trend MicroJoie Salvio
ROVNIX Infects Systems with Password-Protected Macros
ReactorBot
2014-11-14F-SecureF-Secure Labs
OnionDuke: APT Attacks Via the Tor Network
OnionDuke
2014-11-13ABC NewsDylan Welch
Chinese hackers 'breach Australian media organisations' ahead of G20
APT19
2014-11-12ESET ResearchRobert Lipovsky
Korplug military targeted attacks: Afghanistan & Tajikistan
DarkStRat
2014-11-10Trend MicroWilliam Gamazo Sanchez
Timeline of Sandworm Attacks
Sandworm
2014-11-10Trend MicroWilliam Gamazo Sanchez
Timeline of Sandworm Attacks
Sandworm
2014-11-10Blaze's Security BlogBartBlaze
Thoughts on Absolute Computrace
Computrace
2014-11-08How-To-Hack.netH4ck
Review of jSpy a RAT from jSpy.net
jSpy
2014-10-31G DataG Data
OPERATION “TOOHASH”: HOW TARGETED ATTACKS WORK
Cohhoc ProjectWood Gelsemium
2014-10-30G DataG Data
COM Object hijacking: the discreet way of persistence
COMpfun
2014-10-28NovettaNovetta
Operation SMN: Axiom Threat Actor Group Report
BLACKCOFFEE Derusbi HiKit
2014-10-27Trend MicroAlfred Remorin, Douglas Otis, Feike Hacquebord, Fernando Mercês, Jim Gogolinski, Loucif Kharouni, Numaan Huq
Operation Pawn Storm: Using Decoys to Evade Detection
Sedreco Seduploader APT28
2014-10-14SymantecSymantec Security Response
Security vendors take action against Hidden Lynx malware
Gameover P2P HiKit Shylock APT17