Click here to download all references as Bib-File.

Enter keywords to filter the library entries below or Propose new Entry
2015-05-15Check PointStanislav Skuratovich
MATSNU
Matsnu
2015-05-15Malware DiggerHanan Natan
Rovnix Dropper Analysis (TrojanDropper:Win32/Rovnix.P)
ReactorBot Rovnix
2015-05-13Trend MicroKervin Alintanahin
Operation Tropic Trooper
APT23
2015-05-13CylanceJon Gross
Cylance SPEAR Team: A Threat Actor Resurfaces
GreenShaitan
2015-05-07G DataG Data
Dissecting the “Kraken”
Laziok
2015-05-04Cisco TalosAlex Chiu, Ben Baker
Threat Spotlight: Rombertik – Gazing Past the Smoke, Mirrors, and Trapdoors
Rombertik
2015-05-02Barry Vengerik, Jonathan Wrolstad, Jordan Berry, Kristen Dennesen
HACKING THE STREET? FIN4 LIKELY PLAYING THE MARKET
WOLF SPIDER
2015-05-01FireEyeFireEye
HIDING IN PLAIN SIGHT: FIREEYE AND MICROSOFT EXPOSE OBFUSCATION TACTIC
BLACKCOFFEE
2015-05-01ESET ResearchMatías Porolli, Pablo Ramos
CPL Malware in Brazil: Somewhere Between Banking Trojans and Malicious Emails
Banload
2015-04-28LookingGlassLookingGlass
Operation Armageddon: Cyber Espionage as a Strategic Component of Russian Modern Warfare
Gamaredon Group
2015-04-27PWCTom Lancaster
Attacks against Israeli & Palestinian interests
Molerats
2015-04-27Cisco TalosAndrea Allievi, Earl Carter, Emmanuel Tacheau
Threat Spotlight: TeslaCrypt – Decrypt It Yourself
TeslaCrypt
2015-04-18FireEyeChris Phillips, Corbin Souffrant, Dan Caselden, Darien Kin, Genwei Jiang, James “Tom” Bennett, Jonathan Wrolstad, Joshua Homan, Yasir Khalid
Operation RussianDoll: Adobe & Windows Zero-Day Exploits Likely Leveraged by Russia’s APT28 in Highly-Targeted Attack
APT28
2015-04-15ByteAtlas
Knowledge Fragment: Bruteforcing Andromeda Configuration Buffers
Andromeda
2015-04-15Ars TechnicaDan Goodin
Elite cyber crime group strikes back after attack by rival APT gang
APT15
2015-04-09ESET ResearchJean-Ian Boutin
Operation Buhtrap, the trap for Russian accountants
Buhtrap BuhTrap
2015-04-01FireEyeFireEye
APT30 AND THE MECHANICS OF A LONG-RUNNING CYBER ESPIONAGE OPERATION
BACKBEND backspace CREAMSICLE FLASHFLOOD GEMCUTTER MILKMAID Naikon NETEAGLE ORANGEADE SHIPSHAPE SPACESHIP SslMM Sys10 WinMM xsPlus APT30
2015-03-31Check Point ResearchCheck Point Research
Volatile Cedar - Analysis of a Global Cyber Espionage Campaign
Volatile Cedar
2015-03-31Kaspersky LabsCostin Raiu, Kurt Baumgartner
Sinkholing Volatile Cedar DGA Infrastructure
Volatile Cedar
2015-03-30Check PointCheck Point
Volatile Cedar
Volatile Cedar