Click here to download all references as Bib-File.

Enter keywords to filter the library entries below or Propose new Entry
2014-12-15CERT.PLCERT.PL
Banatrix – an indepth look
Banatrix
2014-12-10Kaspersky LabsGReAT
Cloud Atlas: RedOctober APT is back in style
Inception Framework
2014-12-10Kaspersky LabsGReAT
Cloud Atlas: RedOctober APT is back in style
Inception Framework
2014-12-09Blue CoatSnorre Fagerland, Waylon Grange
Blue Coat Exposes “The Inception Framework”; Very Sophisticated, Layered Malware Attack Targeted at Military, Diplomats, and Business Execs
CloudAtlas Inception Framework
2014-12-09Blue CoatSnorre Fagerland, Waylon Grange
The Inception Framework: Cloud-hosted APT
Inception Framework
2014-12-09SymantecWaylon Grange
Blue Coat Exposes “The Inception Framework”; Very Sophisticated, Layered Malware Attack Targeted at Military, Diplomats, and Bus
Inception Framework
2014-12-09ThreatpostMichael Mimoso
Linux Modules Connected to Turla APT Discovered
Turla
2014-12-08Trend MicroTrend Micro
The Hack of Sony Pictures: What We Know and What You Need to Know
Lazarus Group
2014-12-01FireEyeBarry Vengerik, Jonathan Wrolstad, Jordan Berry, Kristen Dennesen
FIN4: Stealing Insider Information for an Advantage in Stock Trading?
WOLF SPIDER
2014-11-25Kaspersky LabsBrain Donohue
Regin APT Attacks Among the Most Sophisticated Ever Analyzed
Regin
2014-11-24KasperskyKaspersky Lab
The Regin Platform Nation-State Ownage Of GSM Networks
Regin
2014-11-24KasperskyGReAT
Regin: nation-state ownage of GSM networks
Regin
2014-11-24CrowdStrikeMatt Dahl
I am Ironman: DEEP PANDA Uses Sakula Malware to Target Organizations in Multiple Sectors
APT19
2014-11-21FireEyeJoshua Homan, Mike Oppenheim, Mike Scott, Ned Moran
Operation Double Tap
pirpi
2014-11-14F-SecureF-Secure Labs
OnionDuke: APT Attacks Via the Tor Network
OnionDuke
2014-11-13ABC NewsDylan Welch
Chinese hackers 'breach Australian media organisations' ahead of G20
APT19
2014-11-13ZeroNightsIvanov Boris
Computer Forensic Investigation of mobile Banking Trojan
FIN7
2014-11-12ESET ResearchRobert Lipovsky
Korplug military targeted attacks: Afghanistan & Tajikistan
DarkStRat
2014-11-11G DataG Data
The Uroburos case: new sophisticated RAT identified
Agent.BTZ Uroburos
2014-11-10Trend MicroWilliam Gamazo Sanchez
Timeline of Sandworm Attacks
Sandworm