Click here to download all references as Bib-File.

Enter keywords to filter the library entries below or Propose new Entry
2019-09-12Virus BulletinKamila Babayeva, Maria Rigaki, Sebastian García, Veronica Valeros
A STUDY OF MACHETE CYBER ESPIONAGE OPERATIONS IN LATIN AMERICA
Machete
2019-09-04FireEyeFireEye
APT41: Double Dragon APT41, a dual espionage and cyber crime operation
2019-09-04FireEyeFireEye
APT41: Double Dragon APT41, a dual espionage and cyber crime operation
EASYNIGHT Winnti
2019-09-02Yahoo NewsHuib Modderkolk, Kim Zetter
Revealed: How a secret Dutch mole aided the U.S.-Israeli Stuxnet cyberattack on Iran
Stuxnet
2019-08-22CywareCyware
APT34: The Helix Kitten Cybercriminal Group Loves to Meow Middle Eastern and International Organizations
TwoFace BONDUPDATER POWRUNER QUADAGENT Helminth ISMAgent Karkoff LONGWATCH OopsIE PICKPOCKET RGDoor VALUEVAULT
2019-08-22Positive TechnologiesPositive Technologies
Operation TaskMasters: Cyberespionage in the digital economy age
2019-08-13CyberbitHod Gavriel
HawkEye Malware Changes Keylogging Technique
HawkEye Keylogger
2019-08-09FireEyeFireEye
Double Dragon APT41, a dual espionage and cyber crime operation
CLASSFON crackshot CROSSWALK GEARSHIFT HIGHNOON HIGHNOON.BIN JUMPALL POISONPLUG Winnti
2019-08-07FireEyeChi-en Shen, Dan Perez, Fred Plan, Jacqueline O’Leary, Nalani Fraser, Raymond Leong, Vincent Cannon
APT41: A Dual Espionage and Cyber Crime Operation
APT41
2019-08-01ClearSkyClearSky Cyber Security
2019 H1 Cyber Events Summary Report
EVILNUM Cardinal RAT SappyCache
2019-08-01DragosDragos
Global Oil and Gas Cyber Threat Perspective
2019-06-25CybereasonCybereason Nocturnus
OPERATION SOFT CELL: A WORLDWIDE CAMPAIGN AGAINST TELECOMMUNICATIONS PROVIDERS
CHINACHOPPER HTran MimiKatz Poison Ivy Operation Soft Cell
2019-06-13ae CERTae CERT
Advanced Notification of Cyber Threats against Family of Malware Giving Remote Access to Computers
HyperBro HyperSSL
2019-06-13CybereasonAmit Serper, Mary Zhao
New Pervasive Worm Exploiting Linux Exim Server Vulnerability
Unidentified Linux 001
2019-06-12CyberbitHod Gavriel
Formbook Research Hints Large Data Theft Attack Brewing
Formbook
2019-06-04SlideShareVitali Kremez
Inside Cybercrime Groups Harvesting Active Directory for Fun and Profit - Vitali Kremez
TrickBot
2019-06-03WATER ISACWATER ISAC
15 Cybersecurity Fundamentals for Water and Wastewater Utilities
2019-06-03VaronisDolev Taler, Eric Saraga
Varonis Exposes Global Cyber Campaign: C2 Server Actively Compromising Thousands of Victims
QakBot
2019-05-21ICANNDavid Huberman
ATLAS III Webinar 5: Cybersecurity Basics
Sea Turtle
2019-05-21ICANNDavid Huberman
Cybersecurity & the ICANN Ecosystem
Sea Turtle