Click here to download all references as Bib-File.•
2015-08-31
⋅
SecurityIntelligence
⋅
Shifu: ‘Masterful’ New Banking Trojan Is Attacking 14 Japanese Banks Shifu |
2015-08-27
⋅
CitizenLab
⋅
London Calling: Two-Factor Authentication Phishing From Iran Rocket Kitten |
2015-08-27
⋅
Electronic Frontier Foundation
⋅
New Spear Phishing Campaign Pretends to be EFF APT28 |
2015-08-24
⋅
DarkMatters
⋅
Sphinx: New Zeus Variant for Sale on the Black Market Zeus Sphinx |
2015-08-19
⋅
Github (samratashok)
⋅
Antak WebShell ANTAK |
2015-08-18
⋅
Github (goliate)
⋅
ransomware open-sources HiddenTear |
2015-08-18
⋅
ByteAtlas
⋅
Knowledge Fragment: Unwrapping Fobber Fobber |
2015-08-17
⋅
F-Secure Labs
⋅
THE DUKES 7 YEARS OF RUSSIAN CYBERESPIONAGE COZYDUKE GeminiDuke |
2015-08-12
⋅
Wikipedia
⋅
Islamic State Hacking Division Cyber Caliphate Army |
2015-08-10
⋅
Palo Alto Networks Unit 42
⋅
What’s Next in Malware After Kuluoz? Asprox |
2015-08-10
⋅
Kaspersky Labs
⋅
Darkhotel’s attacks in 2015 DarkHotel DarkHotel |
2015-08-05
⋅
Secureworks
⋅
Threat Group 3390 Cyberespionage APT27 |
2015-08-05
⋅
Secureworks
⋅
Threat Group 3390 Cyberespionage |
2015-08-05
⋅
Ars Technica
⋅
Newly discovered Chinese hacking group hacked 100+ websites to use as “watering holes” APT27 |
2015-08-05
⋅
Black Hat
⋅
Gameover Zeus – Bad Guys and Backends Gameover P2P |
2015-07-30
⋅
ESET Research
⋅
Operation Potao Express: Analysis of a cyber‑espionage toolkit FakeTC |
2015-07-30
⋅
ESET Research
⋅
Operation Potao Express: Analysis of a cyber‑espionage toolkit FakeTC |
2015-07-29
⋅
Youtube (FireEye Inc.)
⋅
HAMMERTOSS: Stealthy Tactics Define a Russian Cyber Threat Group tDiscoverer |
2015-07-27
⋅
Palo Alto Networks Unit 42
⋅
UPS: Observations on CVE-2015-3113, Prior Zero-Days and the Pirpi Payload pirpi |
2015-07-22
⋅
F-Secure
⋅
Duke APT group's latest tools: cloud services and Linux support CloudDuke |