Click here to download all references as Bib-File.•
2014-09-19
⋅
Palo Alto Networks Unit 42
⋅
Recent Watering Hole Attacks Attributed to APT Group “th3bug” Using Poison Ivy APT20 |
2014-09-19
⋅
Palo Alto Networks Unit 42
⋅
Recent Watering Hole Attacks Attributed to APT Group “th3bug” Using Poison Ivy Poison Ivy |
2014-09-05
⋅
Google
⋅
Peering Into the Aquarium: Analysis of a Sophisticated Multi-Stage Malware Family X-Agent |
2014-09-01
⋅
Virus Bulletin
⋅
BOOTKITS: PAST, PRESENT & FUTURE Rovnix |
2014-08-29
⋅
FireEye
⋅
Connecting the Dots: Syrian Malware Team Uses BlackWorm for Attacks Blackworm RAT |
2014-08-28
⋅
Trend Micro
⋅
BIFROSE Now More Evasive Through Tor, Used for Targeted Attack bifrose |
2014-08-28
⋅
AT&T
⋅
Scanbox: A Reconnaissance Framework Used with Watering Hole Attacks scanbox |
2014-08-20
⋅
Kaspersky Labs
⋅
“El Machete” Machete El Machete |
2014-08-13
⋅
FireEye
⋅
Operation Saffron Rose APT15 |
2014-08-13
⋅
FireEye
⋅
OPERATION SAFFRON ROSE Flying Kitten |
2014-08-08
⋅
FireEye
⋅
Sidewinder Targeted Attack Against Android in the Golden Age of AD Libraries RAZOR TIGER |
2014-08-07
⋅
Kaspersky Labs
⋅
The Epic Turla Operation Cobra Carbon System Uroburos Wipbot Turla |
2014-08-07
⋅
The Guardian
⋅
Sophisticated 'Turla' hackers spying on European governments, say researchers Turla |
2014-08-07
⋅
Kaspersky Labs
⋅
The Epic Turla Operation Turla |
2014-07-31
⋅
G Data
⋅
Poweliks: the persistent malware without a file Poweliks |
2014-07-15
⋅
McAfee
⋅
Targeted Attacks on French Company Exploit Multiple Word Vulnerabilities APT24 |
2014-07-15
⋅
McAfee
⋅
Targeted Attacks on French Company Exploit Multiple Word Vulnerabilities PittyTiger RAT |
2014-07-11
⋅
SecurityIntelligence
⋅
The Father of Zeus: Kronos Malware Discovered |
2014-07-10
⋅
Kaspersky Labs
⋅
Versatile DDoS Trojan for Linux BillGates |
2014-07-07
⋅
Symantec
⋅
Dragonfly: Cyberespionage Attacks Against Energy Suppliers Karagany ENERGETIC BEAR |