Click here to download all references as Bib-File.•
2014-01-01
⋅
Council on Foreign Relations
⋅
Operation Cleaver Cleaver |
2014-01-01
⋅
circl.lu
⋅
TR-25 Analysis - Turla / Pfinet / Snake/ Uroburos Cobra Carbon System Uroburos Turla |
2014-01-01
⋅
Fraunhofer FKIE
⋅
Patchwork: Stitching against malware families with IDA Pro Nymaim |
2014-01-01
⋅
nviso
⋅
A history of ATM violence NVISOSPIT |
2014-01-01
⋅
Palo Alto Networks Unit 42
⋅
WIRELURKER: A New Era in iOS and OS X Malware WireLurker WireLurker |
2014-01-01
⋅
Airbus Defence & Space
⋅
The Eye of the Tiger paladin PittyTiger RAT |
2014-01-01
⋅
Trend Micro
⋅
Targeted Attack Trends in Asia-Pacific Elise |
2013-12-18
⋅
Secureworks
⋅
CryptoLocker Ransomware CryptoLocker |
2013-12-18
⋅
ESET Research
⋅
Qadars – a banking Trojan with the Netherlands in its sights Qadars |
2013-12-17
⋅
Gdata
⋅
Bebloh – a well-known banking Trojan with noteworthy innovations UrlZone |
2013-12-12
⋅
FireEye Inc
⋅
OPERATION “KE3CHANG”:Targeted Attacks Against Ministries of Foreign Affairs Tidepool APT15 |
2013-12-12
⋅
Checkpoint
⋅
Malware Research Group HIMAN Malware Analysis himan |
2013-12-11
⋅
Norman Shark
⋅
The Chinese Malware Complexes: The Maudi Surveillance Operation Maudi |
2013-11-10
⋅
FireEye
⋅
Operation Ephemeral Hydra: IE Zero-Day Linked to DeputyDog Uses Diskless Method 9002 RAT |
2013-11-06
⋅
CrowdStrike
⋅
VICEROY TIGER Delivers New Zero-Day Exploit VICEROY TIGER |
2013-11-05
⋅
F-Secure
⋅
Operation Hangover: Unveiling an Indian Cyberattack Infrastructure VICEROY TIGER |
2013-10-31
⋅
FireEye
⋅
Know Your Enemy: Tracking A Rapidly Evolving APT Actor Bozok Poison Ivy TEMPER PANDA |
2013-10-29
⋅
RSA Conference
⋅
Dissecting Banking Trojan Carberp Carberp |
2013-10-16
⋅
CrowdStrike
⋅
CrowdCasts Monthly: You Have an Adversary Problem ELECTRIC PANDA GIBBERISH PANDA TEST PANDA |
2013-10-14
⋅
Trend Micro
⋅
PE_MOFKSYS.A Mofksys |