Click here to download all references as Bib-File.•
2014-01-01
⋅
FireEye
⋅
APT28: A Windows into Russia's Cyber Espionage Operations? OLDBAIT |
2013-11-05
⋅
F-Secure
⋅
Operation Hangover: Unveiling an Indian Cyberattack Infrastructure VICEROY TIGER |
2013-10-10
⋅
CrowdStrike
⋅
Regional Conflict and Cyber Blowback Corsair Jackal |
2013-09-25
⋅
Avast
⋅
Win32/64:Napolar: New Trojan shines on the cyber crime-scene Solarbot |
2013-08-23
⋅
FireEye
⋅
Operation Molerats: Middle East Cyber Attacks Using Poison Ivy Poison Ivy Molerats |
2013-06-26
⋅
Symantec
⋅
Four Years of DarkSeoul Cyberattacks Against South Korea Continue on Anniversary of Korean War Lazarus Group |
2013-06-26
⋅
Symantec
⋅
Four Years of DarkSeoul Cyberattacks Against South Korea Continue on Anniversary of Korean War Lazarus Group |
2013-06-04
⋅
Kaspersky Labs
⋅
Kaspersky Lab Uncovers ‘Operation NetTraveler,’ a Global Cyberespionage Campaign Targeting Government-Affiliated Organizations and Research Institutes APT21 |
2013-03-20
⋅
The New York Times
⋅
Computer Networks in South Korea Are Paralyzed in Cyberattacks Lazarus Group |
2013-03-20
⋅
Kaspersky Labs
⋅
The ‘TeamSpy’ Story -Abusing TeamViewer in Cyberespionage Campaigns TeamSpy Crew |
2013-03-20
⋅
Kaspersky Labs
⋅
The TeamSpy Crew Attacks – Abusing TeamViewer for Cyberespionage TeamSpy Crew |
2013-02-22
⋅
Microsoft
⋅
Recent Cyberattacks WildNeutron |
2013-02-19
⋅
FireEye
⋅
APT1: Exposing One of China’s Cyber Espionage Units APT1 |
2013-01-14
⋅
Kaspersky Labs
⋅
“Red October” Diplomatic Cyber Attacks Investigation Inception Framework |
2013-01-14
⋅
Kaspersky Labs
⋅
The “Red October” Campaign – An Advanced Cyber Espionage Network Targeting Diplomatic and Government Agencies Inception Framework |
2013-01-14
⋅
Kaspersky Labs
⋅
"Red October" Diplomatic Cyber Attacks Investigation Inception Framework |
2013-01-01
⋅
McAfee
⋅
Dissecting Operation Troy: Cyberespionage in South Korea httpdropper |
2012-11-05
⋅
Malwarebytes
⋅
Citadel: a cyber-criminal’s ultimate weapon? Citadel |
2012-09-18
⋅
Pastebin
⋅
QassamCyberFighters's Pastebin Cyber fighters of Izz Ad-Din Al Qassam |
2012-08-10
⋅
Contagiodump Blog
⋅
Gauss samples - Nation-state cyber-surveillance + Banking trojan Gauss |
2012-07-17
⋅
Kaspersky Labs
⋅
Kaspersky Lab and Seculert Announce ‘Madi,’ a Newly Discovered Cyber-Espionage Campaign in the Middle East Madi |
2012-01-13
⋅
Middle East Online
⋅
Cyber war: 'Gaza hackers' deface Israel fire service website Molerats |
2011-11-11
⋅
Project2049
⋅
The Chinese People’s Liberation Army Signals Intelligence and Cyber Reconnaissance Infrastructure |
2011-10-06
⋅
Contagio Dump
⋅
Sep 28 CVE-2010-3333 Manuscript with Taidoor (Trojan.Matryoshka by CyberESI) taidoor |
2011-07-06
⋅
Kaspersky Labs
⋅
Cybercriminals switch from MBR to NTFS Rovnix |
2011-02-10
⋅
McAfee
⋅
Global Energy Cyberattacks: “Night Dragon” Night Dragon |
2011-01-01
⋅
The Brown Journal of World Affairs
⋅
The Spectrum of National Responsibility for Cyberattacks |
2010-04-06
⋅
CitizenLab
⋅
SHADOWS IN THE CLOUD: Investigating Cyber Espionage 2.0 Shadow Network |
2009-07-08
⋅
The Guardian
⋅
Cyber attackers target South Korea and US Lazarus Group |
2009-03-28
⋅
Infinitum Labs
⋅
Tracking GhostNet: Investigating a Cyber Espionage Network Ghost RAT GhostNet |