Click here to download all references as Bib-File.

Enter keywords to filter the library entries below or Propose new Entry
2016-08-07SymantecSymantec Security Response
Strider: Cyberespionage group turns eye of Sauron on targets
ProjectSauron
2016-08-01ZscalerDeepen Desai
Agent Tesla Keylogger delivered using cybersquatting
Agent Tesla
2016-07-25SymantecSymantec
Patchwork cyberespionage group expands targets from governments to wide range of industries
QUILTED TIGER
2016-07-25SymantecJoji Hamada
Patchwork cyberespionage group expands targets from governments to wide range of industries
2016-07-12Fidelis CybersecurityThreat Research Team
Me and Mr. Robot: Tracking the Actor Behind the MAN1 Crypter
Hancitor Vawtrak
2016-07-08Kaspersky LabsGReAT
The Dropping Elephant – aggressive cyber-espionage in the Asian region
QUILTED TIGER
2016-06-13Macnica NetworksMacnica Networks
Survey of the actual situation of the large-scale cyber spy activity that hit Japan | 1st edition
Emdivi PlugX
2016-06-02Trend MicroTrend Micro Cyber Safety Solutions Team
FastPOS: Quick and Easy Credit Card Theft
FastPOS
2016-06-01clearskysecClearSky Cybersecurity
Operation DustySky Part 2
Cobalt FIN7
2016-06-01Trend MicroTrend Micro Cyber Safety Solutions Team
FastPOS: Quick and Easy Credit Card Theft
FastPOS
2016-05-23Reporting and Analysis Centre for Information Assurance MELANISpecialist Staff
Technical Report about the Malware used in the Cyberespionage against RUAG
Turla
2016-05-20ReutersNathan Layne, Tom Bergin
Special Report: Cyber thieves exploit banks' faith in SWIFT transfer network
Lazarus Group
2016-05-15Trend MicroMartin Roesler
What We Can Learn From the Bangladesh Central Bank Cyber Heist
Lazarus Group
2016-05-13BAE SystemsAdrian Nish, Sergei Shevchenko
CYBER HEIST ATTRIBUTION
Sierra(Alfa,Bravo, ...)
2016-04-28SymantecJon DiMaggio
Tick cyberespionage group zeros in on Japan
Tick
2016-04-26Github (CyberMonitor)Jason Jones
New Poison Ivy Activity Targeting Myanmar, Asian Countries
Poison Ivy
2016-04-06ProofpointChris Wakelin
Locky Ransomware Is Becoming More Sophisticated - Cybercriminals Continue Email Campaign Innovation
Rockloader
2016-04-06CybereasonAmit Serper
OSX Pirrit: What adware that 'just' displays ads means for Mac OS X security
Pirrit
2016-04-01FireEyeFireEye
Follow the Money: Dissecting the Operations of the Cyber Crime Group FIN6
Grateful POS FIN6
2016-04-01Bundesamt für VerfassungsschutzVarious
BfV Cyber-Brief: Hinweis auf aktuelle Angriffskampagne
Charming Kitten