Click here to download all references as Bib-File.

Enter keywords to filter the library entries below or Propose new Entry
2016-01-01Group-IBGroup-IB
Analysis of Attacks against Trading and Bank Card Systems
Ranbyus
2016-01-01CysinfoMonnappa K A
CYBER ATTACK IMPERSONATING IDENTITY OF INDIAN THINK TANK TO TARGET CENTRAL BUREAU OF INVESTIGATION (CBI) AND POSSIBLY INDIAN ARMY OFFICIALS
Operation C-Major
2016-01-01CymmetriaCymmetria
Unveiling Patchwork: The Copy-Paste APT
QUILTED TIGER
2016-01-01ClearSkyClearSky Research Team
Operation DustySky
Molerats
2016-01-01FireEyeMichael Bailey
MATRYOSHKA MINING
APT28
2015-12-31ThreatBook
Overseas "Dark Inn" organization launched an APT attack on executives of domestic enterprises
DarkHotel
2015-12-30SANSMichael J. Assante
Current Reporting on the Cyber Attack in Ukraine Resulting in Power Outage
Sandworm
2015-12-26GoogleVarious
APT Groups and Operations
ONHAT
2015-12-22Johannes Bader's BlogJohannes Bader
Kraken's two Domain Generation Algorithms
Oderoor
2015-12-22Bryan Lee, Josh Grunzweig
BBSRAT Attacks Targeting Russian Organizations Linked to Roaming Tiger
Roaming Tiger
2015-12-21FireEyeFireEye Threat Intelligence, Ryann Winters
The EPS Awakens - Part 2
ELMER IRONHALO EvilPost
2015-12-18Palo Alto Networks Unit 42Jen Miller-Osborn, Robert Falcone
Attack on French Diplomat Linked to Operation Lotus Blossom
LOTUS PANDA
2015-12-17BitdefenderBitdefender
APT28 Under the Scope: A Journey into Exfiltrating Intelligence and Government Information
X-Agent XP PrivEsc (CVE-2014-4076)
2015-12-16Facebook (darktrackrat)LuckyDuck
Facebook page advertising DarkTrack RAT
Darktrack RAT
2015-12-11FireEyeDaniel Regalado, Taha Karim
LATENTBOT: Trace Me If You Can
LatentBot
2015-12-08The CitizenlabClaudio Guarnieri, John Scott-Railton, Marion Marschalek, Morgan Marquis-Boire
Packrat: Seven Years of a South American Threat Actor
AdWind Adzok CyberGate Xtreme RAT Packrat
2015-12-07FireEyeDimiter Andonov, Jay Taylor, Nalani Fraser, Will Matson, William Ballenthin
Thriving Beyond The Operating System: Financial Threat Group Targets Volume Boot Record
FIN1
2015-12-07SymantecSecurity Response
Iran-based attackers use back door threats to spy on Middle Eastern targets
CadelSpy Remexi Cadelle
2015-12-07SymantecSymantec Security Response
Iran-based attackers use back door threats to spy on Middle Eastern targets
APT39 Cadelle
2015-12-07SymantecSymantec
Backdoor.Cadelspy and Backdoor.Remexi: indicators of compromise
CadelSpy Remexi