Click here to download all references as Bib-File.

Enter keywords to filter the library entries below or Propose new Entry
2016-05-15Trend MicroMartin Roesler
What We Can Learn From the Bangladesh Central Bank Cyber Heist
Lazarus Group
2016-05-13BAE SystemsAdrian Nish, Sergei Shevchenko
CYBER HEIST ATTRIBUTION
Sierra(Alfa,Bravo, ...)
2016-04-28SymantecJon DiMaggio
Tick cyberespionage group zeros in on Japan
Tick
2016-04-26Github (CyberMonitor)Jason Jones
New Poison Ivy Activity Targeting Myanmar, Asian Countries
Poison Ivy
2016-04-06ProofpointChris Wakelin
Locky Ransomware Is Becoming More Sophisticated - Cybercriminals Continue Email Campaign Innovation
Rockloader
2016-04-06CybereasonAmit Serper
OSX Pirrit: What adware that 'just' displays ads means for Mac OS X security
Pirrit
2016-04-01FireEyeFireEye
Follow the Money: Dissecting the Operations of the Cyber Crime Group FIN6
Grateful POS FIN6
2016-04-01Bundesamt für VerfassungsschutzVarious
BfV Cyber-Brief: Hinweis auf aktuelle Angriffskampagne
Charming Kitten
2016-03-29SymantecJon DiMaggio
Taiwan targeted with new cyberespionage back doorTrojan
Budminer
2016-03-29SymantecJon DiMaggio
Taiwan targeted with new cyberespionage back door Trojan
Dripion Budminer
2016-03-21AT&T CybersecurityEddie Lee, Krishna Kona
OS X Malware Samples Analyzed
Careto CoinThief FlashBack
2016-03-08FireEyeFireEye
SOUTHEAST ASIA: AN EVOLVING CYBER THREAT LANDSCAPE
APT5
2016-02-29SophosPaul Ducklin
The “HawkEye” attack: how cybercrooks target small businesses for big money
HawkEye Keylogger
2016-02-17HackDig
Russian Police Prevented Massive Banking Sector Cyber Attack
Mana Team
2016-02-17AT&T CybersecurityEddie Lee
OceanLotus for OS X – an Application Bundle Pretending to be an Adobe Flash Update
OceanLotus
2016-02-09DARKReadingKelly Jackson Higgins
Chinese Cyberspies Pivot To Russia In Wake Of Obama-Xi Pact
APT21
2016-02-09Kaspersky LabsGReAT
Poseidon Group: a Targeted Attack Boutique specializing in global cyber-espionage
Poseidon Group
2016-01-27Fidelis CybersecurityThreat Research Team
Introducing Hi-Zor RAT
Hi-Zor RAT
2016-01-12Softpedia NewsCatalin Cimpanu
Trochilus RAT Evades Antivirus Detection, Used for Cyber-Espionage in South-East Asia
APT9
2016-01-12FireEyeBarry Vengerik, John Miller
The Magnificent FIN7: Revealing a Cybercriminal Threat Group
BABYMETAL