Click here to download all references as Bib-File.•
2014-07-07
⋅
Symantec
⋅
Dragonfly: Cyberespionage Attacks Against Energy Suppliers ENERGETIC BEAR |
2014-07-07
⋅
Disect Android APKs like a Pro - Static code analysis Retefe |
2014-07-07
⋅
CrowdStrike
⋅
Deep in Thought: Chinese Targeting of National Security Think Tanks APT19 |
2014-07-02
⋅
Trend Micro
⋅
KIVARS With Venom: Targeted Attacks Upgrade with 64-bit “Support” FakeWord KIVARS PLEAD Poison RAT Zeus |
2014-06-27
⋅
SophosLabs
⋅
PlugX - The Next Generation PlugX |
2014-06-04
⋅
Lab of a Penetration Tester
⋅
Introducing Antak - A webshell which utilizes powershell ANTAK |
2014-06-02
⋅
G Data
⋅
Analysis of Uroburos, using WinDbg Uroburos |
2014-06-02
⋅
FireEye
⋅
Molerats, Here for Spring! Molerats |
2014-05-29
⋅
The Washington Times
⋅
Iranian hackers sucker punch U.S. defense officials with creative social-media scam Charming Kitten |
2014-05-28
⋅
iSIGHT Partners (FireEye)
⋅
NEWSCASTER: An Iranian Threat Within Social Networks Charming Kitten |
2014-05-19
⋅
The New York Times
⋅
5 in China Army Face U.S. Charges of Cyberattacks APT1 |
2014-05-15
⋅
Dr.Web
⋅
DDoS Trojans attack Linux MrBlack |
2014-05-13
⋅
CrowdStrike
⋅
Cat Scratch Fever: CrowdStrike Tracks Newly Reported Iranian Actor as FLYING KITTEN Flying Kitten |
2014-05-13
⋅
G Data
⋅
Uroburos rootkit: Belgian Foreign Ministry stricken Uroburos |
2014-05-01
⋅
Arbor Networks
⋅
Into the Light of Day:Uncovering Ongoing and Historical Point of Sale Malware and Attack Campaigns poscardstealer |
2014-04-27
⋅
StopMalvertising
⋅
Analysis of the Predator Pain Keylogger HawkEye Keylogger |
2014-04-17
⋅
Nettitude Labs
⋅
A quick analysis of the latest Shadow Brokers dump DarkPulsar |
2014-03-18
⋅
ESET Research
⋅
Operation Windigo – the vivisection of a large Linux server‑side credential‑stealing malware campaign Boaxxe Glupteba |
2014-03-13
⋅
Threatpost
⋅
Energy Watering Hole Attack Used LightsOut Exploit Kit ENERGETIC BEAR |
2014-03-12
⋅
Blog (Artem Baranov)
⋅
Uroburos: the snake rootkit Uroburos |