Click here to download all references as Bib-File.

Enter keywords to filter the library entries below or Propose new Entry
2015-03-11Kaspersky LabsGReAT
Inside the EquationDrug Espionage Platform
EquationDrug
2015-03-07CERT.PLŁukasz Siewierski
Slave, Banatrix and ransomware
Slave
2015-03-06Kaspersky LabsGReAT
Animals in the APT Farm
SNOWGLOBE
2015-02-27ThreatConnectThreatConnect Research Team
The Anthem Hack: All Roads Lead to China
HttpBrowser
2015-02-27ThreatConnectThreatConnect Research Team
The Anthem Hack: All Roads Lead to China
Derusbi
2015-02-25Trend MicroTrend Micro Threat Research Team
OPERATION ARID VIPER: Bypassing the Iron Dome
AridViper
2015-02-23CrowdStrikeAdam Kozy
Cyber Kung-Fu: The Great Firewall Art of DNS Poisoning
2015-02-18CyphortMarion Marschalek
Babar: Suspected Nation State Spyware In The Spotlight
Babar Evilbunny SNOWGLOBE
2015-02-18Vice MotherboardLorenzo Franceschi-Bicchierai
Meet Babar, a New Malware Almost Certainly Created by France
SNOWGLOBE
2015-02-18Trend MicroTrendmicro
Sexually Explicit Material Used as Lures in Recent Cyber Attacks
AridViper
2015-02-18G DataG Data
Babar: espionage software finally found and put under the microscope
Evilbunny SNOWGLOBE
2015-02-17AvastJan Širmer
Angry Android hacker hides Xbot malware in popular application icons
Xbot
2015-02-17Kaspersky LabsGhareeb Saad, Mohamad Amin Hasbini
The Desert Falcons targeted attacks
AridViper
2015-02-16Kaspersky LabsGReAT
Equation: The Death Star of Malware Galaxy
DoubleFantasy EquationDrug Fanny GROK
2015-02-16Kaspersky LabsGReAT
Equation: The Death Star of Malware Galaxy
Fanny
2015-02-16Ars TechnicaDan Goodin
How “omnipotent” hackers tied to NSA hid for 14 years—and were found at last
Equation Group
2015-02-11FIRST TbilisiAndrzej Dereszowski
Turla-development & operations
Turla
2015-02-10CrowdStrikeCrowdStrike
Global Threat Intel Report
MAGNETIC SPIDER PALE PANDA PREDATOR PANDA SABRE PANDA SPICY PANDA WET PANDA
2015-02-06CrowdStrikeCrowdStrike
CrowdStrike Global Threat Intel Report 2014
BlackPOS CryptoLocker Derusbi Elise Enfal EvilGrab Gameover P2P HttpBrowser Medusa Mirage Naikon NetTraveler pirpi PlugX Poison Ivy Sakula RAT Sinowal sykipot taidoor
2015-02-05FireEyeDerek Gooley, Michael Lin
Anatomy of a Brute Force Campaign: The Story of Hee Thai Limited
XOR DDoS