Click here to download all references as Bib-File.•
| 2013-02-27
⋅
Trend Micro
⋅
BKDR_RARSTONE: New RAT to Watch Out For APT30 |
| 2013-02-25
⋅
WeLiveSecurity
⋅
Caphaw attacking major European banks using webinject plugin Shylock |
| 2013-02-22
⋅
Microsoft
⋅
Recent Cyberattacks WildNeutron |
| 2013-02-19
⋅
Symantec
⋅
APT1: Q&A on Attacks by the Comment Crew APT1 |
| 2013-02-19
⋅
Symantec
⋅
APT1: Q&A on Attacks by the Comment Crew |
| 2013-02-08
⋅
VMWare Carbon Black
⋅
Bit9 and Our Customers’ Security APT17 |
| 2013-02-04
⋅
ESET Research
⋅
What do Win32/Redyms and TDL4 have in common? Redyms |
| 2013-01-24
⋅
ESET Research
⋅
Linux/SSHDoor.A Backdoored SSH daemon that steals passwords SSHDoor |
| 2013-01-21
⋅
Trend Micro
⋅
Shylock Not the Lone Threat Targeting Skype Phorpiex |
| 2013-01-19
⋅
Spamhaus
⋅
Cooperative Efforts To Shut Down Virut Botnet Virut |
| 2013-01-18
⋅
Contagiodump Blog
⋅
Dec 2012 Batchwiper Samples BatchWiper |
| 2013-01-17
⋅
Kaspersky Labs
⋅
“Red October” – Part Two, the Modules Inception Framework |
| 2013-01-14
⋅
Kaspersky Labs
⋅
“Red October” Diplomatic Cyber Attacks Investigation Inception Framework |
| 2013-01-14
⋅
Kaspersky Labs
⋅
The “Red October” Campaign – An Advanced Cyber Espionage Network Targeting Diplomatic and Government Agencies Inception Framework |
| 2013-01-14
⋅
Kaspersky Labs
⋅
"Red October" Diplomatic Cyber Attacks Investigation Inception Framework |
| 2013-01-02
⋅
Capstone Turbine Corporation Also Targeted in the CFR Watering Hole Attack And More APT19 |
| 2013-01-01
⋅
FireEye
⋅
APTs By The Dozen: Dissecting Advanced Attacks Korlia |
| 2013-01-01
⋅
McAfee
⋅
Dissecting Operation Troy: Cyberespionage in South Korea httpdropper |
| 2013-01-01
⋅
Trend Micro
⋅
FAKEM RAT Terminator RAT |
| 2012-12-29
⋅
Eric Romang Blog
⋅
Attack and IE 0day Informations Used Against Council on Foreign Relations APT19 |