Click here to download all references as Bib-File.

Enter keywords to filter the library entries below or Propose new Entry
2017-10-31McAfeeXiaobing Lin
Expiro Malware Is Back and Even Harder to Remove
Expiro
2017-07-04McAfeeMcAfee
Important information about Night Dragon
Night Dragon
2017-06-01McAfeeMcAfee
McAfee Labs Threats Report
Pony
2016-07-21McAfeeMohinder Gill, Oliver Devane
Phishing Attacks Employ Old but Effective Password Stealer
ISR Stealer
2016-07-21McAfeeMohinder Gill, Oliver Devane
Phishing Attacks Employ Old but Effective Password Stealer
ISR Stealer
2014-07-15McAfeeMcAfee
Targeted Attacks on French Company Exploit Multiple Word Vulnerabilities
APT24
2014-07-15McAfeeMcAfee
Targeted Attacks on French Company Exploit Multiple Word Vulnerabilities
PittyTiger RAT
2014-02-15McAfeeMcAfee
Examining Your Very Own Sefnit Trojan
Mevade
2013-03-21McAfeeMcAfee
VSkimmer Botnet Targets Credit Card Payment Terminals
vSkimmer
2013-01-01McAfeeItai Liba, James Walter, Ryan Sherstobitoff
Dissecting Operation Troy: Cyberespionage in South Korea
httpdropper
2013-01-01McAfeeItai Liba, James Walter, Ryan Sherstobitoff
Dissecting Operation Troy: Cyberespionage in South Korea
httpdropper
2013-01-01McAfeeItai Liba, James Walter, Ryan Sherstobitoff
Dissecting Operation Troy: Cyberespionage in South Korea
httpdropper
2012-04-05McAfeeMcAfee
Darkshell DDOS Botnet Evolves With Variants
DarkShell
2011-02-10McAfeeMcAfee Foundstone Professional Services, McAfee Labs
Global Energy Cyberattacks: “Night Dragon”
Night Dragon
2011-02-10McAfeeMcAfee Foundstone Professional Services, McAfee Labs
Global Energy Cyberattacks: “Night Dragon”
Night Dragon