Click here to download all references as Bib-File.•
2014-11-13
⋅
ABC News
⋅
Chinese hackers 'breach Australian media organisations' ahead of G20 APT19 |
2014-11-13
⋅
ZeroNights
⋅
Computer Forensic Investigation of mobile Banking Trojan FIN7 |
2014-11-12
⋅
ESET Research
⋅
Korplug military targeted attacks: Afghanistan & Tajikistan DarkStRat |
2014-11-10
⋅
Trend Micro
⋅
Timeline of Sandworm Attacks Sandworm |
2014-11-10
⋅
Trend Micro
⋅
Timeline of Sandworm Attacks Sandworm |
2014-11-10
⋅
Kaspersky Labs
⋅
The Darkhotel APT DarkHotel |
2014-11-10
⋅
Kaspersky Labs
⋅
The Darkhotel APT DarkHotel |
2014-11-08
⋅
How-To-Hack.net
⋅
Review of jSpy a RAT from jSpy.net jSpy |
2014-11-04
⋅
BitBucket
⋅
IDApatchwork Repository Nymaim |
2014-11-03
⋅
Kaspersky Labs
⋅
BE2 custom plugins, router abuse, and target profiles BlackEnergy |
2014-10-31
⋅
G Data
⋅
OPERATION “TOOHASH”: HOW TARGETED ATTACKS WORK Cohhoc ProjectWood Gelsemium |
2014-10-30
⋅
G Data
⋅
COM Object hijacking: the discreet way of persistence COMpfun |
2014-10-27
⋅
Trend Micro
⋅
Operation Pawn Storm: Using Decoys to Evade Detection Sedreco Seduploader APT28 |
2014-10-27
⋅
PWC
⋅
ScanBox framework – who’s affected, and who’s using it? Jolob |
2014-10-27
⋅
Netresec
⋅
Full Disclosure of Havex Trojans ENERGETIC BEAR |
2014-10-22
⋅
⋅
Kaspersky Labs
⋅
Шифровальщик Cryakl или Фантомас разбушевался Cryakl |
2014-10-20
⋅
PWC
⋅
OrcaRAT - A whale of a tale OrcaRAT |
2014-10-14
⋅
CrowdStrike
⋅
CrowdStrike Discovers Use of 64-bit Zero-Day Privilege Escalation Exploit (CVE-2014-4113) by Hurricane Panda HURRICANE PANDA |
2014-10-14
⋅
Symantec
⋅
Security vendors take action against Hidden Lynx malware Gameover P2P HiKit Shylock APT17 |
2014-10-14
⋅
Symantec
⋅
Sandworm Windows zero-day vulnerability being actively exploited in targeted attacks Sandworm |