Click here to download all references as Bib-File.

Enter keywords to filter the library entries below or Propose new Entry
2015-09-17F-SecureF-Secure Labs
The Dukes: 7 Years Of Russian Cyber-Espionage
APT29
2015-09-17Trend MicroTrendmicro
Operation Iron Tiger: Exploring Chinese Cyber-Espionage Attacks on United States Defense Contractors
APT27
2015-09-16Trend MicroChristopher Budd
Operation Iron Tiger: Attackers Shift from East Asia to the United States
APT27
2015-09-15ProofpointAleksey F, Thoufique Haq
In Pursuit of Optical Fibers and Troop Intel: Targeted Attack Distributes PlugX in Russia
PlugX
2015-09-14Kaspersky LabsFedor Sinitsyn, Victor Alyushin
The Shade Encryptor: a Double Threat
CMSBrute Troldesh
2015-09-11MacMarkMarkus Möller
CSI MacMark: Janicab
Janicab
2015-09-11Raytheon Blackbird TechnologiesRaytheon Blackbird Technologies
20150911-280-CSIT-15085 NfLog
IsSpace
2015-09-11GovCERT.chGovCERT.ch
Analysing a new eBanking Trojan called Fobber
Fobber
2015-09-10FireEyeGenwei Jiang, Josiah Kimble
Hangul Word Processor (HWP)Zero-Day: possible ties to North Korean threat actors
HOPLIGHT
2015-09-09KnowBe4KnowBe4
Pony Stealer Malware
Pony
2015-09-09Kaspersky LabsStefan Tanase
Satellite Turla: APT Command and Control in the Sky
Turla
2015-09-09Kaspersky LabsStefan Tanase
Satellite Turla: APT Command and Control in the Sky
Satellite Turla Turla
2015-09-08ESET ResearchAnton Cherepanov
Carbanak gang is back and packing new guns
DRIFTPIN
2015-09-01Virus BulletinJaromír Hořejší, Peter Kálnai
DDOS TROJAN: A MALICIOUS CONCEPT THAT CONQUERED THE ELF FORMAT
Bashlite MrBlack XOR DDoS BillGates
2015-09-01F-SecureF-Secure Labs
The Dukes - 7 Years of Russian Cyberespionage
PinchDuke
2015-09-01WikipediaVarious
Fancy Bear
APT28
2015-09-01Trend MicroCedric Pernet, Eyal Sela
The Spy Kittens Are Back:Rocket Kitten 2
Cleaver
2015-09-01Trend MicroCedric Pernet, Eyal Sela
The Spy Kittens Are Back: Rocket Kitten 2
Rocket Kitten
2015-09-01WikipediaVarious
Fancy Bear
APT28
2015-09-01Trend MicroBenson Sy
Attackers Target Organizations in Japan; Transform Local Sites into C&C Servers for EMDIVI Backdoor
Emdivi