Click here to download all references as Bib-File.

Enter keywords to filter the library entries below or Propose new Entry
2015-04-01FireEyeFireEye
APT30 AND THE MECHANICS OF A LONG-RUNNING CYBER ESPIONAGE OPERATION
BACKBEND backspace CREAMSICLE FLASHFLOOD GEMCUTTER MILKMAID Naikon NETEAGLE ORANGEADE SHIPSHAPE SPACESHIP SslMM Sys10 WinMM xsPlus APT30
2015-03-31Check Point ResearchCheck Point Research
Volatile Cedar - Analysis of a Global Cyber Espionage Campaign
Volatile Cedar
2015-03-31Kaspersky LabsCostin Raiu, Kurt Baumgartner
Sinkholing Volatile Cedar DGA Infrastructure
Volatile Cedar
2015-03-30Check PointCheck Point
Volatile Cedar
Volatile Cedar
2015-03-30SymantecChristian Tripputi
New reconnaissance threat Trojan.Laziok targets the energy sector
Laziok
2015-03-30Trend MicroCedric Pernet, Dark Luo
Fake Judicial Spam Leads to Backdoor with Fake Certificate Authority
GootKit
2015-03-24Trend MicroCedric Pernet, Kenney Lu
Operation Woolen-Goldfish: When Kittens Go Phishing
Ghole Woolger
2015-03-20Cisco TalosAlain Zidouemba, Andrea Allievi, Angel Villegas, Ben Baker, Douglas Goddard, JJ Cummings, Nick Biasini, William Largent
Threat Spotlight: PoSeidon, A Deep Dive Into Point of Sale Malware
FindPOS
2015-03-19Trend MicroCedric Pernet, Kenney Lu
Operation WOOLEN-GOLDFISH: When Kittens Go Phishing
Ghole Woolger
2015-03-19Muhammad Junaid Bohio
Analyzing a Backdoor/Bot forthe MIPS Platform
TheMoon
2015-03-19Trend MicroTrend Micro
Rocket Kitten Showing Its Claws: Operation Woolen-GoldFish and the GHOLE campaign
Cleaver Rocket Kitten
2015-03-18Seattle TimesMike Baker
Feds warned Premera about security flaws before breach
APT19
2015-03-11Kaspersky LabsGReAT
Inside the EquationDrug Espionage Platform
EquationDrug
2015-03-07CERT.PLŁukasz Siewierski
Slave, Banatrix and ransomware
Slave
2015-03-06Kaspersky LabsGReAT
Animals in the APT Farm
SNOWGLOBE
2015-02-27ThreatConnectThreatConnect Research Team
The Anthem Hack: All Roads Lead to China
HttpBrowser
2015-02-27ThreatConnectThreatConnect Research Team
The Anthem Hack: All Roads Lead to China
Derusbi
2015-02-25Trend MicroTrend Micro Threat Research Team
OPERATION ARID VIPER: Bypassing the Iron Dome
AridViper
2015-02-23CrowdStrikeAdam Kozy
Cyber Kung-Fu: The Great Firewall Art of DNS Poisoning
2015-02-18CyphortMarion Marschalek
Babar: Suspected Nation State Spyware In The Spotlight
Babar Evilbunny SNOWGLOBE