Click here to download all references as Bib-File.•
2015-06-04
⋅
Palo Alto Networks Unit 42
⋅
KeyBase Keylogger Malware Family Exposed KeyBase |
2015-06-03
⋅
ClearSky
⋅
Thamar Reservoir – An Iranian cyber-attack campaign against targets in the Middle East Rocket Kitten |
2015-06-03
⋅
ClearSky
⋅
Thamar Reservoir – An Iranian cyber-attack campaign against targets in the Middle East SamSam |
2015-06-01
⋅
CrowdStrike
⋅
Rhetoric Foreshadows Cyber Activity in the South China Sea APT23 |
2015-06-01
⋅
Check Point
⋅
“Troldesh” – New Ransomware from Russia Troldesh |
2015-05-29
⋅
Kaspersky Labs
⋅
THE MsnMM CAMPAIGNS: The Earliest Naikon APT Campaigns APT30 Naikon |
2015-05-28
⋅
Malwarebytes Labs
⋅
Unusual Exploit Kit Targets Chinese Users (Part 1) Chinad |
2015-05-26
⋅
ESET Research
⋅
Moose – the router worm with an appetite for social networks Moose |
2015-05-20
⋅
Sentrant
⋅
Bedep Ad-Fraud Botnet Analysis – Exposing the Mechanics Behind 153.6M Defrauded Ad Impressions A Day Bedep |
2015-05-18
⋅
Palo Alto Networks Unit 42
⋅
Cmstar Downloader: Lurid and Enfal’s New Cousin |
2015-05-17
⋅
CERT.PL
⋅
Newest addition to a happy family: KBOT Bolek |
2015-05-15
⋅
Carefirst Blue Cross Breach Hits 1.1M APT19 |
2015-05-15
⋅
Check Point
⋅
MATSNU Matsnu |
2015-05-14
⋅
Kaspersky Labs
⋅
The Naikon APT Naikon SslMM Sys10 WinMM xsPlus APT30 Naikon |
2015-05-13
⋅
Trend Micro
⋅
Operation Tropic Trooper APT23 |
2015-05-10
⋅
root9b
⋅
APT28 Targets Financial Markets |
2015-05-10
⋅
NextGov
⋅
Third-Party Software Was Entry Point for Background-Check System Hack APT19 |
2015-05-07
⋅
G Data
⋅
Dissecting the “Kraken” Laziok |
2015-05-04
⋅
Cisco Talos
⋅
Threat Spotlight: Rombertik – Gazing Past the Smoke, Mirrors, and Trapdoors Rombertik |
2015-05-02
⋅
HACKING THE STREET? FIN4 LIKELY PLAYING THE MARKET WOLF SPIDER |