Click here to download all references as Bib-File.

Enter keywords to filter the library entries below or Propose new Entry
2014-10-28CiscoAlain Zidouemba, Andrea Allievi, Douglas Goddard, Shaun Hurley
Threat Spotlight: Group 72, Opening the ZxShell
ZXShell
2014-10-27Trend MicroAlfred Remorin, Douglas Otis, Feike Hacquebord, Fernando Mercês, Jim Gogolinski, Loucif Kharouni, Numaan Huq
Operation Pawn Storm: Using Decoys to Evade Detection
Sedreco Seduploader APT28
2014-10-20PWCDan Kelly, Tom Lancaster
OrcaRAT - A whale of a tale
OrcaRAT
2014-10-15ESET ResearchOlivier Bilodeau
Operation Windigo: “Good job, ESET!” says malware author
Ebury
2014-10-14CrowdStrikeDmitri Alperovitch
CrowdStrike Discovers Use of 64-bit Zero-Day Privilege Escalation Exploit (CVE-2014-4113) by Hurricane Panda
HURRICANE PANDA
2014-10-14SymantecSymantec Security Response
Sandworm Windows zero-day vulnerability being actively exploited in targeted attacks
Sandworm
2014-10-14SymantecSymantec Security Response
Sandworm Windows zero-day vulnerability being actively exploited in targeted attacks
Sandworm
2014-10-06FireEyeNart Villeneuve
Data Theft in Aisle 9: A FireEye Look at Threats to Retailers
2014-10-03Palo Alto Networks Unit 42Jen Miller-Osborn
New Indicators of Compromise for APT Group Nitro Uncovered
Nitro
2014-10-01Trend MicroAlfred Remorin, Douglas Otis, Feike Hacquebord, Fernando Mercês, Jim Gogolinski, Loucif Kharouni, Numaan Huq
Operation Pawn Storm: Using Decoys to Evade Detection
2014-09-30FireEyeMike Scott, Ned Moran, Sai Vashisht, Thoufique Haq
OPERATION QUANTUM ENTANGLEMENT
NewCT DragonOK
2014-09-23maldr0id blogŁukasz Siewierski
Android malware based on SMS encryption and with KitKat support
Retefe
2014-09-22SecurityIntelligenceAssaf Regev, Tal Darsan
Tinba Malware Reloaded and Attacking Banks Around the World
Tinba
2014-09-19Palo Alto Networks Unit 42Jen Miller-Osborn, Ryan Olson
Recent Watering Hole Attacks Attributed to APT Group “th3bug” Using Poison Ivy
APT20
2014-09-19Palo Alto Networks Unit 42Jen Miller-Osborn, Ryan Olson
Recent Watering Hole Attacks Attributed to APT Group “th3bug” Using Poison Ivy
Poison Ivy
2014-09-05GoogleBilly Leonard, Neel Mehta, Shane Huntiey
Peering Into the Aquarium: Analysis of a Sophisticated Multi-Stage Malware Family
X-Agent
2014-09-01Virus BulletinAlexander Matrosov, David Harley, Eugene Rodionov
BOOTKITS: PAST, PRESENT & FUTURE
Rovnix
2014-08-29FireEyeKyle Wilhoit, Thoufique Haq
Connecting the Dots: Syrian Malware Team Uses BlackWorm for Attacks
Blackworm RAT
2014-08-28Trend MicroChristopher Daniel So
BIFROSE Now More Evasive Through Tor, Used for Targeted Attack
bifrose
2014-08-28AT&TJaime Blasco
Scanbox: A Reconnaissance Framework Used with Watering Hole Attacks
scanbox