Click here to download all references as Bib-File.

Enter keywords to filter the library entries below or Propose new Entry
2013-01-19SpamhausThomas Morrison
Cooperative Efforts To Shut Down Virut Botnet
Virut
2013-01-18Contagiodump BlogMila Parkour
Dec 2012 Batchwiper Samples
BatchWiper
2013-01-17Kaspersky LabsGReAT
“Red October” – Part Two, the Modules
Inception Framework
2013-01-14Kaspersky LabsGReAT
“Red October” Diplomatic Cyber Attacks Investigation
Inception Framework
2013-01-14Kaspersky LabsGReAT
The “Red October” Campaign – An Advanced Cyber Espionage Network Targeting Diplomatic and Government Agencies
Inception Framework
2013-01-14Kaspersky LabsGReAT
"Red October" Diplomatic Cyber Attacks Investigation
Inception Framework
2013-01-02Eric Romang
Capstone Turbine Corporation Also Targeted in the CFR Watering Hole Attack And More
APT19
2013-01-01FireEyeAlex Lanstein
APTs By The Dozen: Dissecting Advanced Attacks
Korlia
2013-01-01McAfeeItai Liba, James Walter, Ryan Sherstobitoff
Dissecting Operation Troy: Cyberespionage in South Korea
httpdropper
2013-01-01Trend MicroJessa dela Torre, Nart Villeneuve
FAKEM RAT
Terminator RAT
2012-12-29Eric Romang BlogEric Romang
Attack and IE 0day Informations Used Against Council on Foreign Relations
APT19
2012-12-23Contagio DumpMila Parkour
Dec 2012 Dexter - POS Infostealer samples and information
Dexter
2012-12-19ESET ResearchAleksandr Matrosov
Win32/Spy.Ranbyus modifying Java code in RBS Ukraine systems
Ranbyus
2012-12-12Volatility LabsMichael Hale Ligh
Unpacking Dexter POS "Memory Dump Parsing" Malware
Dexter
2012-12-05Malware Don't Need CoffeeKafeine
The path to infection - Eye glance at the first line of "Russian Underground" - focused on Ransomware
RunForestRun Andromeda Citadel Lyposit Matsnu Reveton Sinowal UPAS Urausy
2012-12-03F-SecureSean
New Mac Malware Found on Dalai Lama Related Website
Dockster
2012-11-29Trend MicroTrend Micro
What’s the Fuss with WORM_VOBFUS?
Vobfus
2012-11-27SophosSophos
Threat Description: Troj/Ployx-A
ployx
2012-11-22SymantecSecurity Response
W32.Narilam – Business Database Sabotage
Narilam
2012-11-16SymantecTakashi Katsuki
Malware Targeting Windows 8 Uses Google Docs
Makadocs