Click here to download all references as Bib-File.•
2014-12-15
⋅
CERT.PL
⋅
Banatrix – an indepth look Banatrix |
2014-12-10
⋅
Kaspersky Labs
⋅
Cloud Atlas: RedOctober APT is back in style Inception Framework |
2014-12-10
⋅
Kaspersky Labs
⋅
Cloud Atlas: RedOctober APT is back in style Inception Framework |
2014-12-09
⋅
Blue Coat
⋅
Blue Coat Exposes “The Inception Framework”; Very Sophisticated, Layered Malware Attack Targeted at Military, Diplomats, and Business Execs CloudAtlas Inception Framework |
2014-12-09
⋅
Blue Coat
⋅
The Inception Framework: Cloud-hosted APT Inception Framework |
2014-12-09
⋅
Symantec
⋅
Blue Coat Exposes “The Inception Framework”; Very Sophisticated, Layered Malware Attack Targeted at Military, Diplomats, and Bus Inception Framework |
2014-12-09
⋅
Threatpost
⋅
Linux Modules Connected to Turla APT Discovered Turla |
2014-12-08
⋅
Trend Micro
⋅
The Hack of Sony Pictures: What We Know and What You Need to Know Lazarus Group |
2014-12-01
⋅
FireEye
⋅
FIN4: Stealing Insider Information for an Advantage in Stock Trading? WOLF SPIDER |
2014-11-25
⋅
Kaspersky Labs
⋅
Regin APT Attacks Among the Most Sophisticated Ever Analyzed Regin |
2014-11-24
⋅
Kaspersky
⋅
The Regin Platform Nation-State Ownage Of GSM Networks Regin |
2014-11-24
⋅
Kaspersky
⋅
Regin: nation-state ownage of GSM networks Regin |
2014-11-24
⋅
CrowdStrike
⋅
I am Ironman: DEEP PANDA Uses Sakula Malware to Target Organizations in Multiple Sectors APT19 |
2014-11-21
⋅
FireEye
⋅
Operation Double Tap pirpi |
2014-11-14
⋅
F-Secure
⋅
OnionDuke: APT Attacks Via the Tor Network OnionDuke |
2014-11-13
⋅
ABC News
⋅
Chinese hackers 'breach Australian media organisations' ahead of G20 APT19 |
2014-11-13
⋅
ZeroNights
⋅
Computer Forensic Investigation of mobile Banking Trojan FIN7 |
2014-11-12
⋅
ESET Research
⋅
Korplug military targeted attacks: Afghanistan & Tajikistan DarkStRat |
2014-11-11
⋅
G Data
⋅
The Uroburos case: new sophisticated RAT identified Agent.BTZ Uroburos |
2014-11-10
⋅
Trend Micro
⋅
Timeline of Sandworm Attacks Sandworm |