Click here to download all references as Bib-File.•
2013-12-11
⋅
Norman Shark
⋅
The Chinese Malware Complexes: The Maudi Surveillance Operation Maudi |
2013-12-05
⋅
ESET Research
⋅
Did you sayAdvanced Persistent Threats? Terminator RAT |
2013-11-10
⋅
FireEye
⋅
Operation Ephemeral Hydra: IE Zero-Day Linked to DeputyDog Uses Diskless Method 9002 RAT |
2013-11-05
⋅
F-Secure
⋅
Operation Hangover: Unveiling an Indian Cyberattack Infrastructure VICEROY TIGER |
2013-10-10
⋅
CrowdStrike
⋅
Regional Conflict and Cyber Blowback Corsair Jackal |
2013-09-26
⋅
Malwarebytes
⋅
New Solarbot Malware Debuts, Creator Publicly Advertising Solarbot |
2013-09-25
⋅
Kaspersky Labs
⋅
The Icefog APT: A Tale of Cloak and Three Daggers DAGGER PANDA |
2013-09-24
⋅
AT&T
⋅
OSX/Leverage.a Analysis Leverage |
2013-09-24
⋅
How to extract BetaBot config info BetaBot |
2013-09-21
⋅
FireEye
⋅
Operation DeputyDog: Zero-Day (CVE-2013-3893) Attack Against Japanese Targets DeputyDog APT17 |
2013-09-21
⋅
FireEye
⋅
Operation DeputyDog: Zero-Day (CVE-2013-3893) Attack Against Japanese Targets DeputyDog |
2013-09-18
⋅
Zscaler
⋅
A New Wave Of WIN32/CAPHAW Attacks - A ThreatLabZ Analysis Shylock |
2013-09-11
⋅
Kaspersky Labs
⋅
The “Kimsuky” Operation: A North Korean APT? Kimsuky |
2013-09-04
⋅
Trend Micro
⋅
Sykipot Now Targeting US Civil Aviation Sector Information APT4 |
2013-09-04
⋅
Trend Micro
⋅
Sykipot Now Targeting US Civil Aviation Sector Information sykipot |
2013-08-23
⋅
FireEye
⋅
Operation Molerats: Middle East Cyber Attacks Using Poison Ivy Poison Ivy Molerats |
2013-08-13
⋅
KrebsOnSecurity
⋅
Inside a ‘Reveton’ Ransomware Operation Reveton |
2013-08-12
⋅
FireEye
⋅
Survival of the Fittest: New York Times Attackers Evolve Quickly yayih |
2013-08-02
⋅
CitizenLab
⋅
Surtr Malware Family Targeting the Tibetan Community surtr |
2013-08-01
⋅
Virus Bulletin
⋅
Andromeda 2.7 features Andromeda |