Click here to download all references as Bib-File.

Enter keywords to filter the library entries below or Propose new Entry
2014-09-19Palo Alto Networks Unit 42Jen Miller-Osborn, Ryan Olson
Recent Watering Hole Attacks Attributed to APT Group “th3bug” Using Poison Ivy
APT20
2014-09-19Palo Alto Networks Unit 42Jen Miller-Osborn, Ryan Olson
Recent Watering Hole Attacks Attributed to APT Group “th3bug” Using Poison Ivy
Poison Ivy
2014-09-05GoogleBilly Leonard, Neel Mehta, Shane Huntiey
Peering Into the Aquarium: Analysis of a Sophisticated Multi-Stage Malware Family
X-Agent
2014-09-01Virus BulletinAlexander Matrosov, David Harley, Eugene Rodionov
BOOTKITS: PAST, PRESENT & FUTURE
Rovnix
2014-08-29FireEyeKyle Wilhoit, Thoufique Haq
Connecting the Dots: Syrian Malware Team Uses BlackWorm for Attacks
Blackworm RAT
2014-08-28Trend MicroChristopher Daniel So
BIFROSE Now More Evasive Through Tor, Used for Targeted Attack
bifrose
2014-08-28AT&TJaime Blasco
Scanbox: A Reconnaissance Framework Used with Watering Hole Attacks
scanbox
2014-08-20Kaspersky LabsGReAT
“El Machete”
Machete El Machete
2014-08-13FireEyeFireEye
Operation Saffron Rose
APT15
2014-08-13FireEyeMike Scott, Nart Villeneuve, Ned Moran, Thoufique Haq
OPERATION SAFFRON ROSE
Flying Kitten
2014-08-08FireEyeFireEye
Sidewinder Targeted Attack Against Android in the Golden Age of AD Libraries
RAZOR TIGER
2014-08-07Kaspersky LabsGReAT
The Epic Turla Operation
Cobra Carbon System Uroburos Wipbot Turla
2014-08-07The GuardianTom Brewster
Sophisticated 'Turla' hackers spying on European governments, say researchers
Turla
2014-08-07Kaspersky LabsGReAT
The Epic Turla Operation
Turla
2014-07-31G DataG Data
Poweliks: the persistent malware without a file
Poweliks
2014-07-15McAfeeMcAfee
Targeted Attacks on French Company Exploit Multiple Word Vulnerabilities
APT24
2014-07-15McAfeeMcAfee
Targeted Attacks on French Company Exploit Multiple Word Vulnerabilities
PittyTiger RAT
2014-07-11SecurityIntelligenceEtay Maor
The Father of Zeus: Kronos Malware Discovered
2014-07-10Kaspersky LabsMikhail Kuzin
Versatile DDoS Trojan for Linux
BillGates
2014-07-07SymantecSecurity Response
Dragonfly: Cyberespionage Attacks Against Energy Suppliers
Karagany ENERGETIC BEAR