Click here to download all references as Bib-File.•
2015-06-10
⋅
Win32/Upatre.BI - Part One Upatre |
2015-06-09
⋅
Check Point
⋅
New Data: Volatile Cedar Malware Campaign Volatile Cedar |
2015-06-03
⋅
ClearSky
⋅
Thamar Reservoir – An Iranian cyber-attack campaign against targets in the Middle East Rocket Kitten |
2015-06-03
⋅
ClearSky
⋅
Thamar Reservoir – An Iranian cyber-attack campaign against targets in the Middle East SamSam |
2015-05-15
⋅
Check Point
⋅
MATSNU Matsnu |
2015-05-15
⋅
Malware Digger
⋅
Rovnix Dropper Analysis (TrojanDropper:Win32/Rovnix.P) ReactorBot Rovnix |
2015-05-13
⋅
Trend Micro
⋅
Operation Tropic Trooper APT23 |
2015-05-13
⋅
Cylance
⋅
Cylance SPEAR Team: A Threat Actor Resurfaces GreenShaitan |
2015-05-07
⋅
G Data
⋅
Dissecting the “Kraken” Laziok |
2015-05-04
⋅
Cisco Talos
⋅
Threat Spotlight: Rombertik – Gazing Past the Smoke, Mirrors, and Trapdoors Rombertik |
2015-05-02
⋅
HACKING THE STREET? FIN4 LIKELY PLAYING THE MARKET WOLF SPIDER |
2015-05-01
⋅
FireEye
⋅
HIDING IN PLAIN SIGHT: FIREEYE AND MICROSOFT EXPOSE OBFUSCATION TACTIC BLACKCOFFEE |
2015-05-01
⋅
ESET Research
⋅
CPL Malware in Brazil: Somewhere Between Banking Trojans and Malicious Emails Banload |
2015-04-28
⋅
LookingGlass
⋅
Operation Armageddon: Cyber Espionage as a Strategic Component of Russian Modern Warfare Gamaredon Group |
2015-04-27
⋅
PWC
⋅
Attacks against Israeli & Palestinian interests Molerats |
2015-04-27
⋅
Cisco Talos
⋅
Threat Spotlight: TeslaCrypt – Decrypt It Yourself TeslaCrypt |
2015-04-18
⋅
FireEye
⋅
Operation RussianDoll: Adobe & Windows Zero-Day Exploits Likely Leveraged by Russia’s APT28 in Highly-Targeted Attack APT28 |
2015-04-15
⋅
Knowledge Fragment: Bruteforcing Andromeda Configuration Buffers Andromeda |
2015-04-15
⋅
Ars Technica
⋅
Elite cyber crime group strikes back after attack by rival APT gang APT15 |
2015-04-09
⋅
ESET Research
⋅
Operation Buhtrap, the trap for Russian accountants Buhtrap BuhTrap |