Click here to download all references as Bib-File.•
2014-02-06
⋅
⋅
Habr
⋅
Исследуем Linux Botnet «BillGates» BillGates |
2014-02-02
⋅
Department of Justice
⋅
U.S. Leads Multi-National Action Against “Gameover Zeus” Botnet and “Cryptolocker” Ransomware, Charges Botnet Administrator CryptoLocker |
2014-01-22
⋅
SC Magazine
⋅
Iran and Russia blamed for state-sponsored espionage ENERGETIC BEAR Magic Kitten |
2014-01-22
⋅
SC Magazine
⋅
Iran and Russia blamed for state-sponsored espionage APT27 |
2014-01-21
⋅
Sophos Naked Security
⋅
Digitally signed data-stealing malware targets Mac users in “undelivered courier item” attack Laoshu |
2014-01-19
⋅
Electronic Frontier Foundation
⋅
Vietnamese Malware Gets Very Personal Cuegoe |
2014-01-01
⋅
Council on Foreign Relations
⋅
Operation Cleaver Cleaver |
2014-01-01
⋅
FireEye
⋅
Operation Quantum Entanglement IsSpace NewCT Poison Ivy SysGet |
2014-01-01
⋅
RSA
⋅
RSA Incident Response: Emerging Threat Profile Shell_Crew Derusbi |
2014-01-01
⋅
Fraunhofer FKIE
⋅
Patchwork: Stitching against malware families with IDA Pro Nymaim |
2014-01-01
⋅
nviso
⋅
A history of ATM violence NVISOSPIT |
2014-01-01
⋅
Trend Micro
⋅
Targeted Attack Trends in Asia-Pacific Elise |
2014-01-01
⋅
FireEye
⋅
APT28: A Windows into Russia's Cyber Espionage Operations? OLDBAIT |
2013-12-17
⋅
Gdata
⋅
Bebloh – a well-known banking Trojan with noteworthy innovations UrlZone |
2013-12-12
⋅
FireEye Inc
⋅
OPERATION “KE3CHANG”:Targeted Attacks Against Ministries of Foreign Affairs Tidepool APT15 |
2013-12-11
⋅
Norman Shark
⋅
The Chinese Malware Complexes: The Maudi Surveillance Operation Maudi |
2013-12-05
⋅
ESET Research
⋅
Did you sayAdvanced Persistent Threats? Terminator RAT |
2013-11-10
⋅
FireEye
⋅
Operation Ephemeral Hydra: IE Zero-Day Linked to DeputyDog Uses Diskless Method 9002 RAT |
2013-11-05
⋅
F-Secure
⋅
Operation Hangover: Unveiling an Indian Cyberattack Infrastructure VICEROY TIGER |
2013-10-10
⋅
CrowdStrike
⋅
Regional Conflict and Cyber Blowback Corsair Jackal |