Click here to download all references as Bib-File.•
2015-08-19
⋅
Github (samratashok)
⋅
Antak WebShell ANTAK |
2015-08-18
⋅
Github (goliate)
⋅
ransomware open-sources HiddenTear |
2015-08-18
⋅
ByteAtlas
⋅
Knowledge Fragment: Unwrapping Fobber Fobber |
2015-08-17
⋅
F-Secure Labs
⋅
THE DUKES 7 YEARS OF RUSSIAN CYBERESPIONAGE COZYDUKE GeminiDuke |
2015-08-12
⋅
Wikipedia
⋅
Islamic State Hacking Division Cyber Caliphate Army |
2015-08-10
⋅
Palo Alto Networks Unit 42
⋅
What’s Next in Malware After Kuluoz? Asprox |
2015-08-10
⋅
Kaspersky Labs
⋅
Darkhotel’s attacks in 2015 DarkHotel DarkHotel |
2015-08-05
⋅
Secureworks
⋅
Threat Group 3390 Cyberespionage APT27 |
2015-08-05
⋅
Secureworks
⋅
Threat Group 3390 Cyberespionage |
2015-08-05
⋅
Ars Technica
⋅
Newly discovered Chinese hacking group hacked 100+ websites to use as “watering holes” APT27 |
2015-08-05
⋅
Black Hat
⋅
Gameover Zeus – Bad Guys and Backends Gameover P2P |
2015-07-30
⋅
ESET Research
⋅
Operation Potao Express: Analysis of a cyber‑espionage toolkit FakeTC |
2015-07-30
⋅
ESET Research
⋅
Operation Potao Express: Analysis of a cyber‑espionage toolkit FakeTC |
2015-07-29
⋅
Youtube (FireEye Inc.)
⋅
HAMMERTOSS: Stealthy Tactics Define a Russian Cyber Threat Group tDiscoverer |
2015-07-27
⋅
Palo Alto Networks Unit 42
⋅
UPS: Observations on CVE-2015-3113, Prior Zero-Days and the Pirpi Payload pirpi |
2015-07-22
⋅
F-Secure
⋅
Duke APT group's latest tools: cloud services and Linux support CloudDuke |
2015-07-20
⋅
paloalto Networks Unit 42
⋅
Watering Hole Attack on Aerospace Firm Exploits CVE-2015-5122 to Install IsSpace Backdoor IsSpace |
2015-07-13
⋅
Symantec
⋅
“Forkmeiamfamous”: Seaduke, latest weapon in the Duke armory SEADADDY |
2015-07-08
⋅
Symantec
⋅
Butterfly: Profiting from high-level corporate attacks WildNeutron |
2015-07-08
⋅
Kaspersky Labs
⋅
Wild Neutron – Economic espionage threat actor returns with new tricks JripBot |