Click here to download all references as Bib-File.

Enter keywords to filter the library entries below or Propose new Entry
2016-06-08FireEyeFireEye
Spear Phishing Attacks: Why They are Successful and How to Stop Them
FIN8
2016-06-08ClearSkyClearSky Research Team
Operation DustySky Part 2
Molerats
2016-06-06Kaspersky LabsAnton Kivva
Everyone sees not what they want to see
Triada
2016-06-01clearskysecClearSky Cybersecurity
Operation DustySky Part 2
Cobalt FIN7
2016-05-31Freebuf360
Operation Mermaid: 6 years of overseas targeted attacks revealed
Infy
2016-05-29CitizenLabBill Marczak, John Scott-Railton
Keep Calm and (Don’t) Enable Macros: A New Threat Actor Targets UAE Dissidents
Stealth Falcon
2016-05-27AnomaliAaron Shelmire
Evidence of Stronger Ties Between North Korea and SWIFT Banking Attacks
DYEPACK Sierra(Alfa,Bravo, ...)
2016-05-26SymantecSecurity Response
SWIFT attackers’ malware linked to more financial attacks
Contopee DYEPACK Sierra(Alfa,Bravo, ...) Lazarus Group
2016-05-26Palo Alto Networks Unit 42Bryan Lee, Robert Falcone
The OilRig Campaign: Attacks on Saudi Arabian Organizations Deliver Helminth Backdoor
OilRig
2016-05-26SymantecSymantec Security Response
SWIFT attackers’ malware linked to more financial attacks
Contopee Lazarus Group
2016-05-26Palo Alto Networks Unit 42Bryan Lee, Robert Falcone
The OilRig Campaign: Attacks on Saudi Arabian Organizations Deliver Helminth Backdoor
Helminth
2016-05-25Kaspersky LabsGReAT
CVE-2015-2545: overview of current threats
APT16 Danti
2016-05-24Palo Alto Networks Unit 42Bryan Lee, Josh Grunzweig, Mike Scott
New Wekby Attacks Use DNS Requests As Command and Control Mechanism
Roseam
2016-05-23Reporting and Analysis Centre for Information Assurance MELANISpecialist Staff
Technical Report about the Malware used in the Cyberespionage against RUAG
Turla
2016-05-22Palo Alto Networks Unit 42Brandon Levene, Jen Miller-Osborn, Micah Yates, Mike Scott, Tom Keigher
Operation Ke3chang Resurfaces With New TidePool Malware
APT15
2016-05-22Palo Alto Networks Unit 42Brandon Levene, Jen Miller-Osborn, Micah Yates, Mike Scott, Tom Keigher
Operation Ke3chang Resurfaces With New TidePool Malware
Tidepool
2016-05-22FireEyeSudeep Singh, Yin Hong Chang
Targeted Attacks against Banks in the Middle East
Helminth OilRig
2016-05-20ReutersNathan Layne, Tom Bergin
Special Report: Cyber thieves exploit banks' faith in SWIFT transfer network
Lazarus Group
2016-05-18ESET ResearchAnton Cherepanov, Robert Lipovsky
Operation Groundbait: Espionage in Ukrainian war zones
Groundbait
2016-05-17SymantecJon DiMaggio
Indian organizations targeted in Suckfly attacks
APT22