Click here to download all references as Bib-File.
2014-08-07 ⋅ Secureworks ⋅ Malware Analysis of the Lurk Downloader Lurk |
2014-08-07 ⋅ Kaspersky Labs ⋅ The Epic Turla Operation Turla Group |
2014-08-07 ⋅ NetScout ⋅ Innaput Actors Utilize Remote Access Trojan Since 2016, Presumably Targeting Victim Files InnaputRAT |
2014-08-07 ⋅ The Guardian ⋅ Sophisticated 'Turla' hackers spying on European governments, say researchers Turla Group |
2014-08-07 ⋅ Kaspersky Labs ⋅ The Epic Turla Operation Cobra Carbon System Uroburos Wipbot Turla Group |
2014-08-04 ⋅ Palo Alto Networks Unit 42 ⋅ New Release: Decrypting NetWire C2 Traffic NetWire RC |
2014-08-01 ⋅ Coding and Security ⋅ Soraya Malware Analysis - Dropper soraya |
2014-07-31 ⋅ G Data ⋅ Poweliks: the persistent malware without a file Poweliks |
2014-07-31 ⋅ FireEye ⋅ Spy of the Tiger paladin Pitty Panda |
2014-07-18 ⋅ Virus Bulletin ⋅ Bird's nest neshta |
2014-07-16 ⋅ StopMalvertising ⋅ Mini Analysis of the TinyBanker Tinba Tinba |
2014-07-15 ⋅ McAfee ⋅ Targeted Attacks on French Company Exploit Multiple Word Vulnerabilities Pitty Panda |
2014-07-15 ⋅ Palo Alto Networks Unit 42 ⋅ Unit 42 Technical Analysis: Seaduke SEADADDY |
2014-07-15 ⋅ McAfee ⋅ Targeted Attacks on French Company Exploit Multiple Word Vulnerabilities PittyTiger RAT |
2014-07-11 ⋅ SecurityIntelligence ⋅ The Father of Zeus: Kronos Malware Discovered |
2014-07-11 ⋅ Airbus Defence & Space ⋅ The Eye of the Tiger Pitty Panda |
2014-07-11 ⋅ Airbus ⋅ The Eye of the Tiger Pitty Panda |
2014-07-11 ⋅ Airbus ⋅ The Eye of the Tiger Pitty Panda |
2014-07-10 ⋅ Europol ⋅ Global Action Targeting Shylock Malware Shylock |
2014-07-10 ⋅ Kaspersky Labs ⋅ Versatile DDoS Trojan for Linux BillGates |