Click here to download all references as Bib-File.•
2017-11-07
⋅
Symantec
⋅
Sowbug: Cyber espionage group targets South American and Southeast Asian governments Felismus StarLoader Sowbug |
2017-11-02
⋅
RiskIQ
⋅
New Insights into Energetic Bear’s Watering Hole Cyber Attacks on Turkish Critical Infrastructure ENERGETIC BEAR |
2017-10-30
⋅
Kaspersky Labs
⋅
Gaza Cybergang – updated activity in 2017: Molerats |
2017-10-27
⋅
Bellingcat
⋅
Bahamut Revisited, More Cyber Espionage in the Middle East and South Asia Bahamut Bahamut Bahamut |
2017-10-26
⋅
RiskIQ
⋅
New htpRAT Gives Complete Remote Control Capabilities to Chinese Cyber Threat Actors htpRAT |
2017-10-24
⋅
ClearSky
⋅
Iranian Threat Agent Greenbug Impersonates Israeli High-Tech and Cyber Security Companies ISMDoor |
2017-10-24
⋅
ClearSky
⋅
Iranian Threat Agent Greenbug Impersonates Israeli High-Tech and Cyber Security Companies Greenbug |
2017-10-22
⋅
Cisco
⋅
“Cyber Conflict” Decoy Document Used In Real Cyber Conflict Seduploader |
2017-09-25
⋅
Kaspersky Labs
⋅
A simple example of a complex cyberattack Microcin Vicious Panda |
2017-09-25
⋅
Kaspersky Labs
⋅
A simple example of a complex cyberattack Microcin |
2017-09-21
⋅
FireEye
⋅
APT33: New Insights into Iranian Cyber Espionage Group APT33 |
2017-09-20
⋅
FireEye
⋅
Insights into Iranian Cyber Espionage: APT33 Targets Aerospace and Energy Sectors and has Ties to Destructive Malware DROPSHOT Nanocore RAT NetWire RC SHAPESHIFT TURNEDUP APT33 |
2017-09-19
⋅
Cymmetria
⋅
Unveiling Patchwork – a targeted attack caught with cyber deception QUILTED TIGER |
2017-08-21
⋅
Trend Micro
⋅
Cyberespionage Group Turla Deploys Backdoor Ahead of G20 Task Force Summit Turla |
2017-07-27
⋅
Trend Micro
⋅
ChessMaster Makes its Move: A Look into the Campaign’s Cyberespionage Arsenal Emdivi |
2017-07-27
⋅
Trend Micro
⋅
ChessMaster Makes its Move: A Look into the Campaign’s Cyberespionage Arsenal APT10 |
2017-07-25
⋅
ClearSky
⋅
Operation Wilted Tulip – Exposing a Cyber Espionage Apparatus Matryoshka RAT TDTESS CopyKittens |
2017-07-17
⋅
Malwarebytes
⋅
It’s baaaack: Public cyber enemy Emotet has returned Emotet |
2017-07-12
⋅
Cybereason
⋅
Operation Escalation: How click-fraud malware transforms into an advanced threat Kovter |
2017-07-03
⋅
ESET Research
⋅
BlackEnergy – what we really know about the notorious cyber attacks BlackEnergy |