Click here to download all references as Bib-File.

Enter keywords to filter the library entries below or Propose new Entry
2014-07-07SymantecSymantec Security Response
Dragonfly: Cyberespionage Attacks Against Energy Suppliers
ENERGETIC BEAR
2014-07-07Victor Dorneanu
Disect Android APKs like a Pro - Static code analysis
Retefe
2014-07-07CrowdStrikeDmitri Alperovitch
Deep in Thought: Chinese Targeting of National Security Think Tanks
APT19
2014-07-02Trend MicroKervin Alintanahin, Ronnie Giagone
KIVARS With Venom: Targeted Attacks Upgrade with 64-bit “Support”
FakeWord KIVARS PLEAD Poison RAT Zeus
2014-06-27SophosLabsGabor Szappanos
PlugX - The Next Generation
PlugX
2014-06-04Lab of a Penetration TesterNikhil Mittal
Introducing Antak - A webshell which utilizes powershell
ANTAK
2014-06-02G DataG Data
Analysis of Uroburos, using WinDbg
Uroburos
2014-06-02FireEyeTimothy Dahms
Molerats, Here for Spring!
Molerats
2014-05-29The Washington TimesCheryl K. Chumley
Iranian hackers sucker punch U.S. defense officials with creative social-media scam
Charming Kitten
2014-05-28iSIGHT Partners (FireEye)iSIGHT Partners
NEWSCASTER: An Iranian Threat Within Social Networks
Charming Kitten
2014-05-19The New York TimesDavid E. Sanger, Michael S. Schmidt
5 in China Army Face U.S. Charges of Cyberattacks
APT1
2014-05-15Dr.WebDr. Web
DDoS Trojans attack Linux
MrBlack
2014-05-13CrowdStrikeMatt Dahl
Cat Scratch Fever: CrowdStrike Tracks Newly Reported Iranian Actor as FLYING KITTEN
Flying Kitten
2014-05-13G DataG Data
Uroburos rootkit: Belgian Foreign Ministry stricken
Uroburos
2014-05-01Arbor NetworksASERT Threat Intelligence
Into the Light of Day:Uncovering Ongoing and Historical Point of Sale Malware and Attack Campaigns
poscardstealer
2014-04-27StopMalvertisingKimberly
Analysis of the Predator Pain Keylogger
HawkEye Keylogger
2014-04-17Nettitude LabsNettitude Labs
A quick analysis of the latest Shadow Brokers dump
DarkPulsar
2014-03-18ESET ResearchPierre-Marc Bureau
Operation Windigo – the vivisection of a large Linux server‑side credential‑stealing malware campaign
Boaxxe Glupteba
2014-03-13Threatpost2014-03-13
Energy Watering Hole Attack Used LightsOut Exploit Kit
ENERGETIC BEAR
2014-03-12Blog (Artem Baranov)Andrzej Dereszowski, Matthieu Kaczmarek
Uroburos: the snake rootkit
Uroburos