Click here to download all references as Bib-File.•
2014-11-10
⋅
Trend Micro
⋅
Timeline of Sandworm Attacks Sandworm |
2014-11-10
⋅
Blaze's Security Blog
⋅
Thoughts on Absolute Computrace Computrace |
2014-11-08
⋅
How-To-Hack.net
⋅
Review of jSpy a RAT from jSpy.net jSpy |
2014-10-31
⋅
G Data
⋅
OPERATION “TOOHASH”: HOW TARGETED ATTACKS WORK Cohhoc ProjectWood Gelsemium |
2014-10-30
⋅
G Data
⋅
COM Object hijacking: the discreet way of persistence COMpfun |
2014-10-28
⋅
Novetta
⋅
Operation SMN: Axiom Threat Actor Group Report BLACKCOFFEE Derusbi HiKit |
2014-10-27
⋅
Trend Micro
⋅
Operation Pawn Storm: Using Decoys to Evade Detection Sedreco Seduploader APT28 |
2014-10-14
⋅
Symantec
⋅
Security vendors take action against Hidden Lynx malware Gameover P2P HiKit Shylock APT17 |
2014-10-14
⋅
Symantec
⋅
Sandworm Windows zero-day vulnerability being actively exploited in targeted attacks Sandworm |
2014-10-14
⋅
Symantec
⋅
Sandworm Windows zero-day vulnerability being actively exploited in targeted attacks Sandworm |
2014-10-14
⋅
Symantec
⋅
Security vendors take action against Hidden Lynx malware HiKit |
2014-10-14
⋅
ESET Research
⋅
CVE‑2014‑4114: Details on August BlackEnergy PowerPoint Campaigns BlackEnergy |
2014-10-01
⋅
Trend Micro
⋅
Operation Pawn Storm: Using Decoys to Evade Detection |
2014-09-22
⋅
SecurityIntelligence
⋅
Tinba Malware Reloaded and Attacking Banks Around the World Tinba |
2014-09-21
⋅
garage4hackers
⋅
Reversing Tinba: World's smallest trojan-banker DGA Code |
2014-09-19
⋅
Palo Alto Networks Unit 42
⋅
Recent Watering Hole Attacks Attributed to APT Group “th3bug” Using Poison Ivy APT20 |
2014-09-19
⋅
Palo Alto Networks Unit 42
⋅
Recent Watering Hole Attacks Attributed to APT Group “th3bug” Using Poison Ivy Poison Ivy |
2014-09-11
⋅
BleepingComputer Forums
⋅
TorrentLocker Ransomware Cracked and Decrypter has been made TorrentLocker |
2014-09-04
⋅
FireEye
⋅
Forced to Adapt: XSLCmd Backdoor Now on OS X XSLCmd APT15 |
2014-08-29
⋅
Kaspersky Labs
⋅
Sinkholing the Backoff POS Trojan Backoff POS |