Click here to download all references as Bib-File.•
2014-08-07
⋅
The Guardian
⋅
Sophisticated 'Turla' hackers spying on European governments, say researchers Turla |
2014-08-07
⋅
Kaspersky Labs
⋅
The Epic Turla Operation Turla |
2014-07-31
⋅
G Data
⋅
Poweliks: the persistent malware without a file Poweliks |
2014-07-15
⋅
McAfee
⋅
Targeted Attacks on French Company Exploit Multiple Word Vulnerabilities APT24 |
2014-07-15
⋅
McAfee
⋅
Targeted Attacks on French Company Exploit Multiple Word Vulnerabilities PittyTiger RAT |
2014-07-11
⋅
SecurityIntelligence
⋅
The Father of Zeus: Kronos Malware Discovered |
2014-07-10
⋅
Kaspersky Labs
⋅
Versatile DDoS Trojan for Linux BillGates |
2014-07-07
⋅
Symantec
⋅
Dragonfly: Cyberespionage Attacks Against Energy Suppliers Karagany ENERGETIC BEAR |
2014-07-07
⋅
Symantec
⋅
Dragonfly: Cyberespionage Attacks Against Energy Suppliers ENERGETIC BEAR |
2014-07-07
⋅
Disect Android APKs like a Pro - Static code analysis Retefe |
2014-07-07
⋅
CrowdStrike
⋅
Deep in Thought: Chinese Targeting of National Security Think Tanks APT19 |
2014-07-02
⋅
Trend Micro
⋅
KIVARS With Venom: Targeted Attacks Upgrade with 64-bit “Support” FakeWord KIVARS PLEAD Poison RAT Zeus |
2014-06-27
⋅
SophosLabs
⋅
PlugX - The Next Generation PlugX |
2014-06-04
⋅
Lab of a Penetration Tester
⋅
Introducing Antak - A webshell which utilizes powershell ANTAK |
2014-06-02
⋅
G Data
⋅
Analysis of Uroburos, using WinDbg Uroburos |
2014-06-02
⋅
FireEye
⋅
Molerats, Here for Spring! Molerats |
2014-05-29
⋅
The Washington Times
⋅
Iranian hackers sucker punch U.S. defense officials with creative social-media scam Charming Kitten |
2014-05-28
⋅
iSIGHT Partners (FireEye)
⋅
NEWSCASTER: An Iranian Threat Within Social Networks Charming Kitten |
2014-05-19
⋅
The New York Times
⋅
5 in China Army Face U.S. Charges of Cyberattacks APT1 |
2014-05-15
⋅
Dr.Web
⋅
DDoS Trojans attack Linux MrBlack |