Click here to download all references as Bib-File.

Enter keywords to filter the library entries below or Propose new Entry
2016-03-29SymantecJon DiMaggio
Taiwan targeted with new cyberespionage back doorTrojan
Budminer
2016-03-29SymantecJon DiMaggio
Taiwan targeted with new cyberespionage back door Trojan
Dripion Budminer
2016-03-21AT&T CybersecurityEddie Lee, Krishna Kona
OS X Malware Samples Analyzed
Careto CoinThief FlashBack
2016-03-08FireEyeFireEye
SOUTHEAST ASIA: AN EVOLVING CYBER THREAT LANDSCAPE
APT5
2016-02-29SophosPaul Ducklin
The “HawkEye” attack: how cybercrooks target small businesses for big money
HawkEye Keylogger
2016-02-17HackDig
Russian Police Prevented Massive Banking Sector Cyber Attack
Mana Team
2016-02-17AT&T CybersecurityEddie Lee
OceanLotus for OS X – an Application Bundle Pretending to be an Adobe Flash Update
OceanLotus
2016-02-09DARKReadingKelly Jackson Higgins
Chinese Cyberspies Pivot To Russia In Wake Of Obama-Xi Pact
APT21
2016-02-09Kaspersky LabsGReAT
Poseidon Group: a Targeted Attack Boutique specializing in global cyber-espionage
Poseidon Group
2016-01-27Fidelis CybersecurityThreat Research Team
Introducing Hi-Zor RAT
Hi-Zor RAT
2016-01-12Softpedia NewsCatalin Cimpanu
Trochilus RAT Evades Antivirus Detection, Used for Cyber-Espionage in South-East Asia
APT9
2016-01-12FireEyeBarry Vengerik, John Miller
The Magnificent FIN7: Revealing a Cybercriminal Threat Group
BABYMETAL
2016-01-01VerintPeikan Tsung
An Intelligence-Driven Approach to Cyber Defense
Gelsemium
2016-01-01CysinfoMonnappa K A
CYBER ATTACK IMPERSONATING IDENTITY OF INDIAN THINK TANK TO TARGET CENTRAL BUREAU OF INVESTIGATION (CBI) AND POSSIBLY INDIAN ARMY OFFICIALS
Operation C-Major
2015-12-30SANSMichael J. Assante
Current Reporting on the Cyber Attack in Ukraine Resulting in Power Outage
Sandworm
2015-12-01FireEyeFireEye Threat Intelligence
China-based Cyber Threat Group Uses Dropbox for Malware Communications and Targets Hong Kong Media Outlets
BUBBLEWRAP LOWBALL TEMPER PANDA
2015-10-26BluelivBlueliv
Chasing cybercrime: network insights of Dyre and Dridex Trojan bankers
Dridex Dyre
2015-10-13DARKReadingKelly Jackson Higgins
Prolific Cybercrime Gang Favors Legit Login Credentials
FIN5
2015-09-28Kaspersky LabsGhareeb Saad, Mohamad Amin Hasbini
Gaza cybergang, where’s your IR team?
Molerats
2015-09-17F-SecureF-Secure Labs
The Dukes: 7 Years Of Russian Cyber-Espionage
APT29