Click here to download all references as Bib-File.•
2012-02-15
⋅
Security Intelligence
⋅
Merchant of Fraud Returns: Shylock Polymorphic Financial Malware Infections on the Rise Shylock |
2012-02-10
⋅
tracker.h3x.eu
⋅
Info for Family: plugx PlugX |
2012-02-01
⋅
Contagio Dump
⋅
TDL4 - Purple Haze (Pihar) Variant - sample and analysis Alureon |
2012-01-13
⋅
Middle East Online
⋅
Cyber war: 'Gaza hackers' deface Israel fire service website Molerats |
2012-01-12
⋅
Contagio Dump
⋅
Blackhole Ramnit - samples and analysis Ramnit |
2012-01-06
⋅
XyliBox
⋅
Cracking Cold$eal 5.4.1 FWB++ Cold$eal |
2012-01-06
⋅
Exploit-DB
⋅
Official Malware Report: Malware Reverse Engineering FakeRean |
2012-01-04
⋅
PCWorld
⋅
SpyEye Malware Borrows Zeus Trick to Mask Fraud SpyEye |
2012-01-01
⋅
Cobalt Strike
⋅
Cobalt Strike Website Cobalt Strike |
2012-01-01
⋅
Symantec
⋅
The Luckycat Hackers Lucky Cat |
2012-01-01
⋅
Trend Micro
⋅
Inside an APT Campaign with Multiple Targets in India and Japan Lucky Cat |
2012-01-01
⋅
CSIS Trend Micro
⋅
W32.Tinba (Tinybanker) The Turkish Incident Tinba |
2012-01-01
⋅
Symantec
⋅
W32.Qakbot in Detail QakBot |
2011-12-11
⋅
Open Security Research
⋅
Intro. To Reversing - W32Pinkslipbot QakBot |
2011-12-08
⋅
Symantec
⋅
The Sykipot Attacks sykipot |
2011-11-11
⋅
Project2049
⋅
The Chinese People’s Liberation Army Signals Intelligence and Cyber Reconnaissance Infrastructure |
2011-10-31
⋅
Trend Micro
⋅
The Significance of the "Nitro" Attacks Nitro |
2011-10-26
⋅
Intego
⋅
Tsunami Backdoor Can Be Used for Denial of Service Attacks Tsunami |
2011-10-14
⋅
SANS
⋅
A Detailed Analysis of an Advanced Persistent Threat Malware ProjectWood |
2011-10-13
⋅
A Detailed Analysis of an Advanced Persistent Threat Malware woody |