Click here to download all references as Bib-File.•
2014-01-01
⋅
nviso
⋅
A history of ATM violence NVISOSPIT |
2014-01-01
⋅
Palo Alto Networks Unit 42
⋅
WIRELURKER: A New Era in iOS and OS X Malware WireLurker WireLurker |
2014-01-01
⋅
Airbus Defence & Space
⋅
The Eye of the Tiger paladin PittyTiger RAT |
2014-01-01
⋅
Trend Micro
⋅
Targeted Attack Trends in Asia-Pacific Elise |
2013-12-18
⋅
Secureworks
⋅
CryptoLocker Ransomware CryptoLocker |
2013-12-18
⋅
ESET Research
⋅
Qadars – a banking Trojan with the Netherlands in its sights Qadars |
2013-12-17
⋅
Gdata
⋅
Bebloh – a well-known banking Trojan with noteworthy innovations UrlZone |
2013-12-12
⋅
FireEye Inc
⋅
OPERATION “KE3CHANG”:Targeted Attacks Against Ministries of Foreign Affairs Tidepool APT15 |
2013-12-12
⋅
Checkpoint
⋅
Malware Research Group HIMAN Malware Analysis himan |
2013-12-11
⋅
Norman Shark
⋅
The Chinese Malware Complexes: The Maudi Surveillance Operation Maudi |
2013-11-10
⋅
FireEye
⋅
Operation Ephemeral Hydra: IE Zero-Day Linked to DeputyDog Uses Diskless Method 9002 RAT |
2013-11-06
⋅
CrowdStrike
⋅
VICEROY TIGER Delivers New Zero-Day Exploit VICEROY TIGER |
2013-11-05
⋅
F-Secure
⋅
Operation Hangover: Unveiling an Indian Cyberattack Infrastructure VICEROY TIGER |
2013-11-02
⋅
The MalwareMustDie Blog
⋅
RunForrestRun DGA "Comeback" with new obfuscation RunForestRun |
2013-10-31
⋅
FireEye
⋅
Know Your Enemy: Tracking A Rapidly Evolving APT Actor Bozok Poison Ivy TEMPER PANDA |
2013-10-29
⋅
RSA Conference
⋅
Dissecting Banking Trojan Carberp Carberp |
2013-10-16
⋅
CrowdStrike
⋅
CrowdCasts Monthly: You Have an Adversary Problem ELECTRIC PANDA GIBBERISH PANDA TEST PANDA |
2013-10-14
⋅
Trend Micro
⋅
PE_MOFKSYS.A Mofksys |
2013-10-10
⋅
CrowdStrike
⋅
Regional Conflict and Cyber Blowback Corsair Jackal |
2013-09-25
⋅
Avast
⋅
Win32/64:Napolar: New Trojan shines on the cyber crime-scene Solarbot |