Click here to download all references as Bib-File.•
2013-02-22
⋅
Microsoft
⋅
Recent Cyberattacks WildNeutron |
2013-02-19
⋅
Symantec
⋅
APT1: Q&A on Attacks by the Comment Crew APT1 |
2013-02-19
⋅
Symantec
⋅
APT1: Q&A on Attacks by the Comment Crew |
2013-02-08
⋅
VMWare Carbon Black
⋅
Bit9 and Our Customers’ Security APT17 |
2013-02-04
⋅
ESET Research
⋅
What do Win32/Redyms and TDL4 have in common? Redyms |
2013-01-24
⋅
ESET Research
⋅
Linux/SSHDoor.A Backdoored SSH daemon that steals passwords SSHDoor |
2013-01-21
⋅
Trend Micro
⋅
Shylock Not the Lone Threat Targeting Skype Phorpiex |
2013-01-19
⋅
Spamhaus
⋅
Cooperative Efforts To Shut Down Virut Botnet Virut |
2013-01-18
⋅
Contagiodump Blog
⋅
Dec 2012 Batchwiper Samples BatchWiper |
2013-01-17
⋅
Kaspersky Labs
⋅
“Red October” – Part Two, the Modules Inception Framework |
2013-01-14
⋅
Kaspersky Labs
⋅
“Red October” Diplomatic Cyber Attacks Investigation Inception Framework |
2013-01-14
⋅
Kaspersky Labs
⋅
The “Red October” Campaign – An Advanced Cyber Espionage Network Targeting Diplomatic and Government Agencies Inception Framework |
2013-01-14
⋅
Kaspersky Labs
⋅
"Red October" Diplomatic Cyber Attacks Investigation Inception Framework |
2013-01-02
⋅
Capstone Turbine Corporation Also Targeted in the CFR Watering Hole Attack And More APT19 |
2013-01-01
⋅
FireEye
⋅
APTs By The Dozen: Dissecting Advanced Attacks Korlia |
2013-01-01
⋅
McAfee
⋅
Dissecting Operation Troy: Cyberespionage in South Korea httpdropper |
2013-01-01
⋅
Trend Micro
⋅
FAKEM RAT Terminator RAT |
2012-12-29
⋅
Eric Romang Blog
⋅
Attack and IE 0day Informations Used Against Council on Foreign Relations APT19 |
2012-12-23
⋅
Contagio Dump
⋅
Dec 2012 Dexter - POS Infostealer samples and information Dexter |
2012-12-19
⋅
ESET Research
⋅
Win32/Spy.Ranbyus modifying Java code in RBS Ukraine systems Ranbyus |