Click here to download all references as Bib-File.

Enter keywords to filter the library entries below or Propose new Entry
2016-01-01VerintPeikan Tsung
An Intelligence-Driven Approach to Cyber Defense
Gelsemium
2016-01-01CysinfoMonnappa K A
CYBER ATTACK IMPERSONATING IDENTITY OF INDIAN THINK TANK TO TARGET CENTRAL BUREAU OF INVESTIGATION (CBI) AND POSSIBLY INDIAN ARMY OFFICIALS
Operation C-Major
2015-12-30SANSMichael J. Assante
Current Reporting on the Cyber Attack in Ukraine Resulting in Power Outage
Sandworm
2015-12-01FireEyeFireEye Threat Intelligence
China-based Cyber Threat Group Uses Dropbox for Malware Communications and Targets Hong Kong Media Outlets
BUBBLEWRAP LOWBALL TEMPER PANDA
2015-10-26BluelivBlueliv
Chasing cybercrime: network insights of Dyre and Dridex Trojan bankers
Dridex Dyre
2015-10-13DARKReadingKelly Jackson Higgins
Prolific Cybercrime Gang Favors Legit Login Credentials
FIN5
2015-09-28Kaspersky LabsGhareeb Saad, Mohamad Amin Hasbini
Gaza cybergang, where’s your IR team?
Molerats
2015-09-17F-SecureF-Secure Labs
The Dukes: 7 Years Of Russian Cyber-Espionage
APT29
2015-09-17Trend MicroTrendmicro
Operation Iron Tiger: Exploring Chinese Cyber-Espionage Attacks on United States Defense Contractors
APT27
2015-09-01F-SecureF-Secure Labs
The Dukes - 7 Years of Russian Cyberespionage
PinchDuke
2015-08-17F-Secure LabsF-Secure Threat Intelligence Team, Noora Hyvärinen
THE DUKES 7 YEARS OF RUSSIAN CYBERESPIONAGE
COZYDUKE GeminiDuke
2015-08-06SymantecJon DiMaggio
The Black Vine cyberespionage group
Sakula RAT APT19
2015-08-06SymantecJon DiMaggio
The Black Vine cyberespionage group
2015-08-05SecureworksCTU Research Team
Threat Group 3390 Cyberespionage
APT27
2015-08-05SecureworksCTU Research Team
Threat Group 3390 Cyberespionage
2015-07-30ESET ResearchAnton Cherepanov, Robert Lipovsky
Operation Potao Express: Analysis of a cyber‑espionage toolkit
FakeTC
2015-07-30ESET ResearchAnton Cherepanov, Robert Lipovsky
Operation Potao Express: Analysis of a cyber‑espionage toolkit
FakeTC
2015-07-29Youtube (FireEye Inc.)FireEye
HAMMERTOSS: Stealthy Tactics Define a Russian Cyber Threat Group
tDiscoverer
2015-07-01FireEyeFireEye Threat Intelligence
HAMMERTOSS: Stealthy Tactics Define a Russian Cyber Threat Group
tDiscoverer APT29
2015-06-24SpiceworksChris Miller
Stealthy Cyberespionage Campaign Attacks With Social Engineering
NanHaiShu