Click here to download all references as Bib-File.

Enter keywords to filter the library entries below or Propose new Entry
2013-12-11Norman SharkSnorre Fagerland
The Chinese Malware Complexes: The Maudi Surveillance Operation
Maudi
2013-12-05ESET ResearchESET Research
Did you sayAdvanced Persistent Threats?
Terminator RAT
2013-11-10FireEyeMike Scott, Ned Moran, Sai Omkar Vashisht, Thoufique Haq
Operation Ephemeral Hydra: IE Zero-Day Linked to DeputyDog Uses Diskless Method
9002 RAT
2013-11-05F-SecureSnorre Fagerland
Operation Hangover: Unveiling an Indian Cyberattack Infrastructure
VICEROY TIGER
2013-10-10CrowdStrikeMatt Dahl
Regional Conflict and Cyber Blowback
Corsair Jackal
2013-09-26MalwarebytesJoshua Cannell
New Solarbot Malware Debuts, Creator Publicly Advertising
Solarbot
2013-09-25Kaspersky LabsGReAT
The Icefog APT: A Tale of Cloak and Three Daggers
DAGGER PANDA
2013-09-24AT&TEduardo De La Arada
OSX/Leverage.a Analysis
Leverage
2013-09-24Hanan Natan
How to extract BetaBot config info
BetaBot
2013-09-21FireEyeNart Villeneuve, Ned Moran
Operation DeputyDog: Zero-Day (CVE-2013-3893) Attack Against Japanese Targets
DeputyDog APT17
2013-09-21FireEyeNart Villeneuve, Ned Moran
Operation DeputyDog: Zero-Day (CVE-2013-3893) Attack Against Japanese Targets
DeputyDog
2013-09-18ZscalerChris Mannon, Sachin Deodhar
A New Wave Of WIN32/CAPHAW Attacks - A ThreatLabZ Analysis
Shylock
2013-09-11Kaspersky LabsDmitry Tarakanov
The “Kimsuky” Operation: A North Korean APT?
Kimsuky
2013-09-04Trend MicroDarin Dutcher
Sykipot Now Targeting US Civil Aviation Sector Information
APT4
2013-09-04Trend MicroDarin Dutcher
Sykipot Now Targeting US Civil Aviation Sector Information
sykipot
2013-08-23FireEyeNart Villeneuve, Ned Moran, Thoufique Haq
Operation Molerats: Middle East Cyber Attacks Using Poison Ivy
Poison Ivy Molerats
2013-08-13KrebsOnSecurityBrian Krebs
Inside a ‘Reveton’ Ransomware Operation
Reveton
2013-08-12FireEyeNart Villeneuve, Ned Moran
Survival of the Fittest: New York Times Attackers Evolve Quickly
yayih
2013-08-02CitizenLabKatie Kleemola, Seth Hardy
Surtr Malware Family Targeting the Tibetan Community
surtr
2013-08-01Virus BulletinSuweera De Souza
Andromeda 2.7 features
Andromeda