Click here to download all references as Bib-File.•
2014-10-28
⋅
Cisco
⋅
Threat Spotlight: Group 72, Opening the ZxShell ZXShell |
2014-10-27
⋅
Trend Micro
⋅
Operation Pawn Storm: Using Decoys to Evade Detection Sedreco Seduploader APT28 |
2014-10-20
⋅
PWC
⋅
OrcaRAT - A whale of a tale OrcaRAT |
2014-10-15
⋅
ESET Research
⋅
Operation Windigo: “Good job, ESET!” says malware author Ebury |
2014-10-14
⋅
CrowdStrike
⋅
CrowdStrike Discovers Use of 64-bit Zero-Day Privilege Escalation Exploit (CVE-2014-4113) by Hurricane Panda HURRICANE PANDA |
2014-10-14
⋅
Symantec
⋅
Sandworm Windows zero-day vulnerability being actively exploited in targeted attacks Sandworm |
2014-10-14
⋅
Symantec
⋅
Sandworm Windows zero-day vulnerability being actively exploited in targeted attacks Sandworm |
2014-10-06
⋅
FireEye
⋅
Data Theft in Aisle 9: A FireEye Look at Threats to Retailers |
2014-10-03
⋅
Palo Alto Networks Unit 42
⋅
New Indicators of Compromise for APT Group Nitro Uncovered Nitro |
2014-10-01
⋅
Trend Micro
⋅
Operation Pawn Storm: Using Decoys to Evade Detection |
2014-09-30
⋅
FireEye
⋅
OPERATION QUANTUM ENTANGLEMENT NewCT DragonOK |
2014-09-23
⋅
maldr0id blog
⋅
Android malware based on SMS encryption and with KitKat support Retefe |
2014-09-22
⋅
SecurityIntelligence
⋅
Tinba Malware Reloaded and Attacking Banks Around the World Tinba |
2014-09-19
⋅
Palo Alto Networks Unit 42
⋅
Recent Watering Hole Attacks Attributed to APT Group “th3bug” Using Poison Ivy APT20 |
2014-09-19
⋅
Palo Alto Networks Unit 42
⋅
Recent Watering Hole Attacks Attributed to APT Group “th3bug” Using Poison Ivy Poison Ivy |
2014-09-05
⋅
Google
⋅
Peering Into the Aquarium: Analysis of a Sophisticated Multi-Stage Malware Family X-Agent |
2014-09-01
⋅
Virus Bulletin
⋅
BOOTKITS: PAST, PRESENT & FUTURE Rovnix |
2014-08-29
⋅
FireEye
⋅
Connecting the Dots: Syrian Malware Team Uses BlackWorm for Attacks Blackworm RAT |
2014-08-28
⋅
Trend Micro
⋅
BIFROSE Now More Evasive Through Tor, Used for Targeted Attack bifrose |
2014-08-28
⋅
AT&T
⋅
Scanbox: A Reconnaissance Framework Used with Watering Hole Attacks scanbox |