Click here to download all references as Bib-File.•
2013-01-01
⋅
FireEye
⋅
APTs By The Dozen: Dissecting Advanced Attacks Korlia |
2013-01-01
⋅
McAfee
⋅
Dissecting Operation Troy: Cyberespionage in South Korea httpdropper |
2013-01-01
⋅
McAfee
⋅
Dissecting Operation Troy: Cyberespionage in South Korea httpdropper |
2013-01-01
⋅
McAfee
⋅
Dissecting Operation Troy: Cyberespionage in South Korea httpdropper |
2013-01-01
⋅
Trend Micro
⋅
FAKEM RAT Terminator RAT |
2013-01-01
⋅
Trend Micro
⋅
FAKEM RAT Terminator RAT |
2012-12-29
⋅
Eric Romang Blog
⋅
Attack and IE 0day Informations Used Against Council on Foreign Relations APT19 |
2012-12-23
⋅
Contagio Dump
⋅
Dec 2012 Dexter - POS Infostealer samples and information Dexter |
2012-12-19
⋅
ESET Research
⋅
Win32/Spy.Ranbyus modifying Java code in RBS Ukraine systems Ranbyus |
2012-12-12
⋅
Volatility Labs
⋅
Unpacking Dexter POS "Memory Dump Parsing" Malware Dexter |
2012-12-03
⋅
F-Secure
⋅
New Mac Malware Found on Dalai Lama Related Website Dockster |
2012-11-29
⋅
Trend Micro
⋅
What’s the Fuss with WORM_VOBFUS? Vobfus |
2012-11-27
⋅
Sophos
⋅
Threat Description: Troj/Ployx-A ployx |
2012-11-22
⋅
Symantec
⋅
W32.Narilam – Business Database Sabotage Narilam |
2012-11-16
⋅
Symantec
⋅
Malware Targeting Windows 8 Uses Google Docs Makadocs |
2012-11-16
⋅
Github (DesignativeDave)
⋅
Remote Administration Tool for Android devices AndroRAT |
2012-11-16
⋅
Information on Security Blog
⋅
China Chopper Webshell - the 4KB that Owns your Web Server |
2012-11-05
⋅
Malwarebytes
⋅
Citadel: a cyber-criminal’s ultimate weapon? Citadel |
2012-10-12
⋅
The Mac Security Blog
⋅
New Multiplatform Backdoor Jacksbot Discovered jRAT |
2012-10-09
⋅
Trend Micro
⋅
BKDR_SARHUST.A Sarhust |