Click here to download all references as Bib-File.•
2016-09-15
⋅
Palo Alto Networks Unit 42
⋅
MILE TEA: Cyber Espionage Campaign Targets Asia Pacific Businesses and Government Agencies Elirks Logedrut Micrass |
2016-09-06
⋅
Symantec
⋅
Buckeye cyberespionage group shifts gaze from US to Hong Kong Giffy |
2016-09-06
⋅
Symantec
⋅
Buckeye cyberespionage group shifts gaze from US to Hong Kong pirpi APT3 |
2016-09-06
⋅
Symantec
⋅
Buckeye cyberespionage group shifts gaze from US to Hong Kong shareip |
2016-09-06
⋅
Symantec
⋅
Buckeye cyberespionage group shifts gaze from US to Hong Kong APT3 Keylogger |
2016-09-01
⋅
Blueliv
⋅
Chasing Cybercrime: Network insights into Vawtrak v2 Vawtrak |
2016-08-08
⋅
Symantec
⋅
Strider: Cyberespionage group turns eye of Sauron on targets Flame Regin Remsec ProjectSauron |
2016-08-08
⋅
Kaspersky Labs
⋅
ProjectSauron: top level cyber-espionage platform covertly extracts encrypted government comms ProjectSauron |
2016-08-07
⋅
Symantec
⋅
Strider: Cyberespionage group turns eye of Sauron on targets ProjectSauron |
2016-08-01
⋅
Zscaler
⋅
Agent Tesla Keylogger delivered using cybersquatting Agent Tesla |
2016-07-25
⋅
Symantec
⋅
Patchwork cyberespionage group expands targets from governments to wide range of industries QUILTED TIGER |
2016-07-25
⋅
Symantec
⋅
Patchwork cyberespionage group expands targets from governments to wide range of industries |
2016-07-12
⋅
Fidelis Cybersecurity
⋅
Me and Mr. Robot: Tracking the Actor Behind the MAN1 Crypter Hancitor Vawtrak |
2016-07-08
⋅
Kaspersky Labs
⋅
The Dropping Elephant – aggressive cyber-espionage in the Asian region QUILTED TIGER |
2016-06-13
⋅
⋅
Macnica Networks
⋅
Survey of the actual situation of the large-scale cyber spy activity that hit Japan | 1st edition Emdivi PlugX |
2016-06-02
⋅
Trend Micro
⋅
FastPOS: Quick and Easy Credit Card Theft FastPOS |
2016-06-01
⋅
clearskysec
⋅
Operation DustySky Part 2 Cobalt FIN7 |
2016-06-01
⋅
Trend Micro
⋅
FastPOS: Quick and Easy Credit Card Theft FastPOS |
2016-05-23
⋅
Reporting and Analysis Centre for Information Assurance MELANI
⋅
Technical Report about the Malware used in the Cyberespionage against RUAG Turla |
2016-05-20
⋅
Reuters
⋅
Special Report: Cyber thieves exploit banks' faith in SWIFT transfer network Lazarus Group |