Click here to download all references as Bib-File.

Enter keywords to filter the library entries below or Propose new Entry
2014-01-01FireEyeFireEye
APT28: A Windows into Russia's Cyber Espionage Operations?
OLDBAIT
2013-11-05F-SecureSnorre Fagerland
Operation Hangover: Unveiling an Indian Cyberattack Infrastructure
VICEROY TIGER
2013-10-10CrowdStrikeMatt Dahl
Regional Conflict and Cyber Blowback
Corsair Jackal
2013-09-25AvastPeter Kálnai
Win32/64:Napolar: New Trojan shines on the cyber crime-scene
Solarbot
2013-08-23FireEyeNart Villeneuve, Ned Moran, Thoufique Haq
Operation Molerats: Middle East Cyber Attacks Using Poison Ivy
Poison Ivy Molerats
2013-06-26SymantecSymantec Security Response
Four Years of DarkSeoul Cyberattacks Against South Korea Continue on Anniversary of Korean War
Lazarus Group
2013-06-26SymantecSecurity Response
Four Years of DarkSeoul Cyberattacks Against South Korea Continue on Anniversary of Korean War
Lazarus Group
2013-06-04Kaspersky LabsGReAT
Kaspersky Lab Uncovers ‘Operation NetTraveler,’ a Global Cyberespionage Campaign Targeting Government-Affiliated Organizations and Research Institutes
APT21
2013-03-20The New York TimesChoe Sang-Hun
Computer Networks in South Korea Are Paralyzed in Cyberattacks
Lazarus Group
2013-03-20Kaspersky LabsGReAT
The ‘TeamSpy’ Story -Abusing TeamViewer in Cyberespionage Campaigns
TeamSpy Crew
2013-03-20Kaspersky LabsGReAT
The TeamSpy Crew Attacks – Abusing TeamViewer for Cyberespionage
TeamSpy Crew
2013-02-22MicrosoftMicrosoft Security Response Center
Recent Cyberattacks
WildNeutron
2013-02-19FireEyeFireEye
APT1: Exposing One of China’s Cyber Espionage Units
APT1
2013-01-14Kaspersky LabsGReAT
“Red October” Diplomatic Cyber Attacks Investigation
Inception Framework
2013-01-14Kaspersky LabsGReAT
The “Red October” Campaign – An Advanced Cyber Espionage Network Targeting Diplomatic and Government Agencies
Inception Framework
2013-01-14Kaspersky LabsGReAT
"Red October" Diplomatic Cyber Attacks Investigation
Inception Framework
2013-01-01McAfeeItai Liba, James Walter, Ryan Sherstobitoff
Dissecting Operation Troy: Cyberespionage in South Korea
httpdropper
2012-11-05MalwarebytesJérôme Segura
Citadel: a cyber-criminal’s ultimate weapon?
Citadel
2012-09-18PastebinQassamCyberFighters
QassamCyberFighters's Pastebin
Cyber fighters of Izz Ad-Din Al Qassam
2012-08-10Contagiodump BlogMila Parkour
Gauss samples - Nation-state cyber-surveillance + Banking trojan
Gauss
2012-07-17Kaspersky LabsKaspersky
Kaspersky Lab and Seculert Announce ‘Madi,’ a Newly Discovered Cyber-Espionage Campaign in the Middle East
Madi
2012-01-13Middle East OnlineMiddle East Online
Cyber war: 'Gaza hackers' deface Israel fire service website
Molerats
2011-11-11Project2049Jenny Lin, L.C. Russell Hsiao, Mark A. Stokes
The Chinese People’s Liberation Army Signals Intelligence and Cyber Reconnaissance Infrastructure
2011-10-06Contagio DumpMila Parkour
Sep 28 CVE-2010-3333 Manuscript with Taidoor (Trojan.Matryoshka by CyberESI)
taidoor
2011-07-06Kaspersky LabsVyacheslav Zakorzhevsky
Cybercriminals switch from MBR to NTFS
Rovnix
2011-02-10McAfeeMcAfee Foundstone Professional Services, McAfee Labs
Global Energy Cyberattacks: “Night Dragon”
Night Dragon
2011-01-01The Brown Journal of World AffairsJason Healey
The Spectrum of National Responsibility for Cyberattacks
2010-04-06CitizenLabCitizenLab, Information Warfare Monitor, Shadowserver Foundation
SHADOWS IN THE CLOUD: Investigating Cyber Espionage 2.0
Shadow Network
2009-07-08The GuardianMatthew Weaver
Cyber attackers target South Korea and US
Lazarus Group
2009-03-28Infinitum LabsInformation Warfare Monitor
Tracking GhostNet: Investigating a Cyber Espionage Network
Ghost RAT GhostNet