Click here to download all references as Bib-File.•
2015-06-19
⋅
London South East
⋅
Russian Hackers Suspected In Cyberattack On German Parliament APT28 |
2015-06-19
⋅
Netzpolitik.org
⋅
Digital Attack on German Parliament: Investigative Report on the Hack of the Left Party Infrastructure in Bundestag XTunnel APT28 |
2015-06-19
⋅
London South East
⋅
Russian Hackers Suspected In Cyberattack On German Parliament |
2015-06-16
⋅
Palo Alto Networks Unit 42
⋅
Operation Lotus Blossom: A New Nation-State Cyberthreat? LOTUS PANDA |
2015-06-15
⋅
Secureworks
⋅
Stegoloader: A Stealthy Information Stealer StegoLoader |
2015-06-15
⋅
KrebsOnSecurity
⋅
Catching Up on the OPM Breach APT19 |
2015-06-10
⋅
Kaspersky Labs
⋅
The Mystery of Duqu 2.0: a sophisticated cyberespionage actor returns DuQu Unit 8200 |
2015-06-10
⋅
Kleissner & Associates
⋅
Pony + Pkybot + Automated Transfer System = Banker Pkybot |
2015-06-10
⋅
Win32/Upatre.BI - Part One Upatre |
2015-06-09
⋅
Check Point
⋅
New Data: Volatile Cedar Malware Campaign Volatile Cedar |
2015-06-03
⋅
ClearSky
⋅
Thamar Reservoir – An Iranian cyber-attack campaign against targets in the Middle East Rocket Kitten |
2015-06-03
⋅
ClearSky
⋅
Thamar Reservoir – An Iranian cyber-attack campaign against targets in the Middle East SamSam |
2015-05-15
⋅
Check Point
⋅
MATSNU Matsnu |
2015-05-15
⋅
Malware Digger
⋅
Rovnix Dropper Analysis (TrojanDropper:Win32/Rovnix.P) ReactorBot Rovnix |
2015-05-13
⋅
Trend Micro
⋅
Operation Tropic Trooper APT23 |
2015-05-13
⋅
Cylance
⋅
Cylance SPEAR Team: A Threat Actor Resurfaces GreenShaitan |
2015-05-07
⋅
G Data
⋅
Dissecting the “Kraken” Laziok |
2015-05-04
⋅
Cisco Talos
⋅
Threat Spotlight: Rombertik – Gazing Past the Smoke, Mirrors, and Trapdoors Rombertik |
2015-05-02
⋅
HACKING THE STREET? FIN4 LIKELY PLAYING THE MARKET WOLF SPIDER |
2015-05-01
⋅
FireEye
⋅
HIDING IN PLAIN SIGHT: FIREEYE AND MICROSOFT EXPOSE OBFUSCATION TACTIC BLACKCOFFEE |