Click here to download all references as Bib-File.

Enter keywords to filter the library entries below or Propose new Entry
2014-03-12FireEyeMike Oppenheim, Ned Moran
A Detailed Examination of the Siesta Campaign
APT1 Siesta
2014-03-12Kaspersky LabsAlexander Gostev
Agent.btz: a Source of Inspiration?
Agent.BTZ
2014-03-07G DataG Data
Uroburos – Deeper travel into kernel protection mitigation
Uroburos
2014-03-06ThreatpostChris Brook
Dexter, Project Hook POS Malware Campaigns Persist
Project Hook POS
2014-03-06Trend MicroMaharlito Aquino
The Siesta Campaign: A New Targeted Attack Awakens
APT1
2014-03-05SymantecMigration User
Android RATs Branch out with Dendroid
Dendroid
2014-03-01ESET ResearchAlexis Dorais-Joncas, Benjamin Vanheuverzwijn, Joan Calvet, Marc-Etienne M.Léveillé, Olivier Bilodeau, Pierre-Marc Bureau
OPERATION WINDIGO
Ebury
2014-02-28G Data BlogG Data
Uroburos - highly complex espionage software with Russian roots
Uroburos
2014-02-24RSA ConferenceDmitri Alperovitch
The Art of Attribution Identifying and Pursuing your Cyber Adversaries
ANDROMEDA SPIDER APT19 DEXTOROUS SPIDER Ghost Jackal Silent Chollima SINGING SPIDER Tonto Team TOXIC PANDA UNION SPIDER
2014-02-19FireEyeJames T. Bennett, Nart Villeneuve
XtremeRAT: Nuisance or Threat?
Xtreme RAT
2014-02-14SecureworksCounter Threat Unit ResearchTeam
Analysis of DHS NCCIC Indicators
jspRAT BeepService DDKeylogger LinseningSvr ONHAT SimpleFileMover ZiyangRAT
2014-02-10Kaspersky LabsGReAT
The Careto/Mask APT: Frequently Asked Questions
Careto Careto
2014-02-06HabrValdikSS
Исследуем Linux Botnet «BillGates»
BillGates
2014-02-02Department of JusticeOffice of Public Affairs
U.S. Leads Multi-National Action Against “Gameover Zeus” Botnet and “Cryptolocker” Ransomware, Charges Botnet Administrator
CryptoLocker
2014-01-22SC MagazineSteve Gold
Iran and Russia blamed for state-sponsored espionage
ENERGETIC BEAR Magic Kitten
2014-01-22SC MagazineSteve Gold
Iran and Russia blamed for state-sponsored espionage
APT27
2014-01-21Sophos Naked SecurityPaul Ducklin
Digitally signed data-stealing malware targets Mac users in “undelivered courier item” attack
Laoshu
2014-01-19Electronic Frontier FoundationEva Galperin, Morgan Marquis-Boire
Vietnamese Malware Gets Very Personal
Cuegoe
2014-01-01Council on Foreign RelationsCyber Operations Tracker
Operation Cleaver
Cleaver
2014-01-01FireEyeFireEye
Operation Quantum Entanglement
IsSpace NewCT Poison Ivy SysGet