Click here to download all references as Bib-File.

Enter keywords to filter the library entries below or Propose new Entry
2013-09-25Kaspersky LabsGReAT
The Icefog APT: A Tale of Cloak and Three Daggers
DAGGER PANDA
2013-09-25ESET ResearchPierre-Marc Bureau
Win32/Napolar – A new bot on the block
Solarbot
2013-09-21FireEyeNart Villeneuve, Ned Moran
Operation DeputyDog: Zero-Day (CVE-2013-3893) Attack Against Japanese Targets
DeputyDog APT17
2013-09-21FireEyeNart Villeneuve, Ned Moran
Operation DeputyDog: Zero-Day (CVE-2013-3893) Attack Against Japanese Targets
DeputyDog
2013-09-18ZscalerChris Mannon, Sachin Deodhar
A New Wave Of WIN32/CAPHAW Attacks - A ThreatLabZ Analysis
Shylock
2013-09-17SymantecBranko Spasojevic, Jonell Baltazar, Jozsef Gegeny, Stephen Doherty
Hidden Lynx – Professional Hackers for Hire
9002 RAT HiKit APT17
2013-09-17SymantecSymantec Security Response
Hidden Lynx – Professional Hackers for Hire
APT17
2013-09-17SymantecSecurity Response
Hidden Lynx – Professional Hackers for Hire
2013-09-17SymantecBranko Spasojevic, Jonell Baltazar, Jozsef Gegeny, Stephen Doherty
Hidden Lynx – Professional Hackers for Hire
2013-09-11Kaspersky LabsDmitry Tarakanov
The “Kimsuky” Operation: A North Korean APT?
Kimsuky
2013-09-09ESET ResearchAnton Cherepanov, Robert Lipovsky
HESPERBOT A New, Advanced Banking Trojan in the Wild
HesperBot
2013-09-05Fox-ITFox IT
Large botnet cause of recent Tor network overload
Mevade
2013-09-04Trend MicroDarin Dutcher
Sykipot Now Targeting US Civil Aviation Sector Information
APT4
2013-09-04Trend MicroDarin Dutcher
Sykipot Now Targeting US Civil Aviation Sector Information
sykipot
2013-08-27AvastPeter Kálnai
Linux Trojan “Hand of Thief” ungloved
Hand of Thief
2013-08-25AusCERTParth Shukla
The Compromised Devices of the Carna Botnet
2013-08-23FireEyeNart Villeneuve, Ned Moran, Thoufique Haq
Operation Molerats: Middle East Cyber Attacks Using Poison Ivy
Poison Ivy Molerats
2013-08-13KrebsOnSecurityBrian Krebs
Inside a ‘Reveton’ Ransomware Operation
Reveton
2013-08-12FireEyeNart Villeneuve, Ned Moran
Survival of the Fittest: New York Times Attackers Evolve Quickly
yayih
2013-08-12ContagioExchangeMila Parkour
Taleret strings - APT (1)
Taleret