Click here to download all references as Bib-File.

Enter keywords to filter the library entries below or Propose new Entry
2012-11-16SymantecTakashi Katsuki
Malware Targeting Windows 8 Uses Google Docs
Makadocs
2012-11-16Github (DesignativeDave)DesignativeDave
Remote Administration Tool for Android devices
AndroRAT
2012-11-16Information on Security BlogKeith Tyler
China Chopper Webshell - the 4KB that Owns your Web Server
2012-11-05MalwarebytesJérôme Segura
Citadel: a cyber-criminal’s ultimate weapon?
Citadel
2012-10-12The Mac Security BlogLysa Myers
New Multiplatform Backdoor Jacksbot Discovered
jRAT
2012-10-09Trend MicroAbraham Latimer Camba
BKDR_SARHUST.A
Sarhust
2012-09-28Dancho Danchev's BlogDancho Danchev
Dissecting 'Operation Ababil' - an OSINT Analysis
Cyber fighters of Izz Ad-Din Al Qassam
2012-08-23Trend MicroThreat Research Team
The Taidoor Campaign: AN IN-DEPTH ANALYSIS
taidoor Taidoor
2012-08-20SymantecTakashi Katsuki
Crisis for Windows Sneaks onto Virtual Machines
Crisis RCS
2012-08-16SymantecSymantec Security Response
The Shamoon Attacks
DistTrack OilRig
2012-08-16SymantecSymantec Security Response
The Shamoon Attacks
OilRig
2012-08-16Kaspersky LabsGReAT
Shamoon the Wiper – Copycats at Work
DistTrack
2012-08-10Contagiodump BlogMila Parkour
Gauss samples - Nation-state cyber-surveillance + Banking trojan
Gauss
2012-08-03Contagio DumpAndre DiMino
Cridex Analysis using Volatility
Feodo
2012-08-02Andre M. DiMino
Cridex Analysis using Volatility
Feodo
2012-07-26Kaspersky LabsGReAT
The Madi Campaign – Part II
Madi
2012-07-25ThreatpostChris Brook
New and Improved Madi Spyware Campaign Continues
Madi
2012-07-22Malware.luMalware.lu
Xtreme RAT analysis
Xtreme RAT
2012-07-18SymantecSecurity Response
The Madi Attacks: Series of Social Engineering Campaigns
Madi
2012-07-17Kaspersky LabsGReAT
The Madi Campaign – Part I
Madi