Click here to download all references as Bib-File.•
2015-06-19
⋅
London South East
⋅
Russian Hackers Suspected In Cyberattack On German Parliament APT28 |
2015-06-19
⋅
London South East
⋅
Russian Hackers Suspected In Cyberattack On German Parliament |
2015-06-16
⋅
Palo Alto Networks Unit 42
⋅
Operation Lotus Blossom: A New Nation-State Cyberthreat? LOTUS PANDA |
2015-06-10
⋅
Kaspersky Labs
⋅
The Mystery of Duqu 2.0: a sophisticated cyberespionage actor returns DuQu Unit 8200 |
2015-06-03
⋅
ClearSky
⋅
Thamar Reservoir – An Iranian cyber-attack campaign against targets in the Middle East Rocket Kitten |
2015-06-03
⋅
ClearSky
⋅
Thamar Reservoir – An Iranian cyber-attack campaign against targets in the Middle East SamSam |
2015-06-01
⋅
CrowdStrike
⋅
Rhetoric Foreshadows Cyber Activity in the South China Sea APT23 |
2015-04-28
⋅
LookingGlass
⋅
Operation Armageddon: Cyber Espionage as a Strategic Component of Russian Modern Warfare Gamaredon Group |
2015-04-15
⋅
FireEye
⋅
APT30 and the Mechanics of a Long-Running Cyber Espionage Campaign backspace FLASHFLOOD NETEAGLE SHIPSHAPE SPACESHIP APT30 |
2015-04-15
⋅
Ars Technica
⋅
Elite cyber crime group strikes back after attack by rival APT gang APT15 |
2015-04-13
⋅
CrowdStrike
⋅
Cyber Deterrence in Action? A story of one long HURRICANE PANDA campaign HURRICANE PANDA |
2015-04-13
⋅
CrowdStrike
⋅
Cyber Deterrence in Action? A story of one long HURRICANE PANDA campaign HURRICANE PANDA |
2015-04-01
⋅
FireEye
⋅
APT30 AND THE MECHANICS OF A LONG-RUNNING CYBER ESPIONAGE OPERATION BACKBEND backspace CREAMSICLE FLASHFLOOD GEMCUTTER MILKMAID Naikon NETEAGLE ORANGEADE SHIPSHAPE SPACESHIP SslMM Sys10 WinMM xsPlus APT30 |
2015-03-31
⋅
Check Point Research
⋅
Volatile Cedar - Analysis of a Global Cyber Espionage Campaign Volatile Cedar |
2015-02-23
⋅
CrowdStrike
⋅
Cyber Kung-Fu: The Great Firewall Art of DNS Poisoning |
2015-02-18
⋅
Trend Micro
⋅
Sexually Explicit Material Used as Lures in Recent Cyber Attacks AridViper |
2014-07-07
⋅
Symantec
⋅
Dragonfly: Cyberespionage Attacks Against Energy Suppliers Karagany ENERGETIC BEAR |
2014-07-07
⋅
Symantec
⋅
Dragonfly: Cyberespionage Attacks Against Energy Suppliers ENERGETIC BEAR |
2014-05-19
⋅
The New York Times
⋅
5 in China Army Face U.S. Charges of Cyberattacks APT1 |
2014-02-24
⋅
RSA Conference
⋅
The Art of Attribution Identifying and Pursuing your Cyber Adversaries ANDROMEDA SPIDER APT19 DEXTOROUS SPIDER Ghost Jackal Silent Chollima SINGING SPIDER Tonto Team TOXIC PANDA UNION SPIDER |