Click here to download all references as Bib-File.•
2015-03-30
⋅
Symantec
⋅
New reconnaissance threat Trojan.Laziok targets the energy sector Laziok |
2015-03-30
⋅
Trend Micro
⋅
Fake Judicial Spam Leads to Backdoor with Fake Certificate Authority GootKit |
2015-03-24
⋅
Trend Micro
⋅
Operation Woolen-Goldfish: When Kittens Go Phishing Ghole Woolger |
2015-03-20
⋅
Cisco Talos
⋅
Threat Spotlight: PoSeidon, A Deep Dive Into Point of Sale Malware FindPOS |
2015-03-19
⋅
Trend Micro
⋅
Operation WOOLEN-GOLDFISH: When Kittens Go Phishing Ghole Woolger |
2015-03-19
⋅
Analyzing a Backdoor/Bot forthe MIPS Platform TheMoon |
2015-03-19
⋅
Trend Micro
⋅
Rocket Kitten Showing Its Claws: Operation Woolen-GoldFish and the GHOLE campaign Cleaver Rocket Kitten |
2015-03-18
⋅
Seattle Times
⋅
Feds warned Premera about security flaws before breach APT19 |
2015-03-11
⋅
Kaspersky Labs
⋅
Inside the EquationDrug Espionage Platform EquationDrug |
2015-03-07
⋅
CERT.PL
⋅
Slave, Banatrix and ransomware Slave |
2015-03-06
⋅
Kaspersky Labs
⋅
Animals in the APT Farm SNOWGLOBE |
2015-02-27
⋅
ThreatConnect
⋅
The Anthem Hack: All Roads Lead to China HttpBrowser |
2015-02-27
⋅
ThreatConnect
⋅
The Anthem Hack: All Roads Lead to China Derusbi |
2015-02-25
⋅
Trend Micro
⋅
OPERATION ARID VIPER: Bypassing the Iron Dome AridViper |
2015-02-23
⋅
CrowdStrike
⋅
Cyber Kung-Fu: The Great Firewall Art of DNS Poisoning |
2015-02-18
⋅
Cyphort
⋅
Babar: Suspected Nation State Spyware In The Spotlight Babar Evilbunny SNOWGLOBE |
2015-02-18
⋅
Vice Motherboard
⋅
Meet Babar, a New Malware Almost Certainly Created by France SNOWGLOBE |
2015-02-18
⋅
Trend Micro
⋅
Sexually Explicit Material Used as Lures in Recent Cyber Attacks AridViper |
2015-02-18
⋅
G Data
⋅
Babar: espionage software finally found and put under the microscope Evilbunny SNOWGLOBE |
2015-02-17
⋅
Avast
⋅
Angry Android hacker hides Xbot malware in popular application icons Xbot |