Click here to download all references as Bib-File.

Enter keywords to filter the library entries below or Propose new Entry
2017-06-27SecureworksCTU Research Team
BRONZE UNION Cyberespionage Persists Despite Disclosures
APT27
2017-06-22Trend MicroCH Lei, Lenart Bermejo, Razor Huang
The Trail of BlackTech’s Cyber Espionage Campaigns
bifrose KIVARS PLEAD
2017-06-22Trend MicroCH Lei, Lenart Bermejo, Razor Huang
Following the Trail of BlackTech’s Cyber Espionage Campaigns
PLEAD BlackTech
2017-06-16FireEyeFireEye
FIN10: Anatomy of a Cyber Extortion Operation
FIN10
2017-06-12BellingcatCollin Anderson
Bahamut, Pursuing a Cyber Espionage Actor in the Middle East
Bahamut Bahamut Bahamut
2017-06-01Trend MicroCH Lei, Lenart Bermejo, Razor Huang
Following the Trail of BlackTech’s Cyber Espionage Campaigns
PLEAD
2017-05-31SymantecJon DiMaggio
Operation Bachosens: A detailed look into a long-running cyber crime campaign
Bachosens
2017-05-25SymantecSecurity Response
Lazarus: History of mysterious group behind infamous cyber attacks
Lazarus Group
2017-05-24CybereasonAssaf Dahan
Operation Cobalt Kitty: A large-scale APT in Asia carried out by the OceanLotus Group
APT32
2017-05-24BrightTALK (FireEye)Nick Carr
APT32: New Cyber Espionage Group
APT32
2017-05-14FireEyeNick Carr
Cyber Espionage is Alive and Well: APT32 and the Threat to Global Corporations
OceanLotus Cuegoe KOMPROGO SOUNDBITE APT32
2017-05-13MalwareTechMalwareTech
How to Accidentally Stop a Global Cyber Attacks
WannaCryptor
2017-05-10CybereasonAmit Serper
Proton.B: What this Mac malware actually does
Proton RAT
2017-05-04Fidelis CybersecurityJason Reaves
Blackmoon Rising: Banking Trojan Back with New Framework
KrBanker
2017-04-26Youtube (Kaspersky)Kaspersky
China's Evolving Cyber Operations: A Look into APT19's Shift in Tactics
Cobalt Strike APT19
2017-04-25CybereasonAssaf Dahan
ShadowWali: New variant of the xxmm family of backdoors
xxmm
2017-04-19Trend MicroTrend Micro Cyber Safety Solutions Team
RawPOS: New Behavior Risks Identity Theft
RawPOS
2017-04-18CyberScoopChris Bing
Shadow Brokers leaks show U.S. spies successfully hacked Russian, Iranian targets
The Shadow Brokers
2017-04-10SymantecA L Johnson
Longhorn: Tools used by cyberespionage group linked to Vault 7
Lambert Longhorn
2017-04-10CyberScoopPatrick Howell O'Neill
DOJ moves to topple Kelihos, one of the world's largest botnets
Kelihos