Click here to download all references as Bib-File.
2012-02-10 ⋅ tracker.h3x.eu ⋅ Info for Family: plugx PlugX |
2012-02-01 ⋅ Contagio Dump ⋅ TDL4 - Purple Haze (Pihar) Variant - sample and analysis Alureon |
2012-01-13 ⋅ Middle East Online ⋅ Cyber war: 'Gaza hackers' deface Israel fire service website Molerats |
2012-01-12 ⋅ Contagio Dump ⋅ Blackhole Ramnit - samples and analysis Ramnit |
2012-01-08 ⋅ XyliBox ⋅ Cold$eal: 'Situation is under control' Cold$eal |
2012-01-06 ⋅ XyliBox ⋅ Cracking Cold$eal 5.4.1 FWB++ Cold$eal |
2012-01-06 ⋅ Exploit-DB ⋅ Official Malware Report: Malware Reverse Engineering FakeRean |
2012-01-04 ⋅ PCWorld ⋅ SpyEye Malware Borrows Zeus Trick to Mask Fraud SpyEye |
2012 ⋅ Trend Micro ⋅ Inside an APT Campaign with Multiple Targets in India and Japan Lucky Cat |
2012 ⋅ Symantec ⋅ The Luckycat Hackers Lucky Cat |
2012 ⋅ Cobalt Strike ⋅ Cobalt Strike Website Cobalt Strike |
2012 ⋅ Symantec ⋅ W32.Qakbot in Detail QakBot |
2012 ⋅ Norman ASA ⋅ The many faces of Gh0st Rat Ghost RAT |
2012 ⋅ CSIS Trend Micro ⋅ W32.Tinba (Tinybanker) The Turkish Incident Tinba |
2011-12-11 ⋅ Open Security Research ⋅ Intro. To Reversing - W32Pinkslipbot QakBot |
2011-12-08 ⋅ Symantec ⋅ The Sykipot Attacks sykipot |
2011-11-23 ⋅ Symantec ⋅ W32.Duqu: The precursor to the next Stuxnet DuQu |
2011-11-11 ⋅ Project2049 ⋅ The Chinese People’s Liberation Army Signals Intelligence and Cyber Reconnaissance Infrastructure |
2011-10-31 ⋅ Trend Micro ⋅ The Significance of the "Nitro" Attacks Nitro |
2011-10-26 ⋅ Intego ⋅ Tsunami Backdoor Can Be Used for Denial of Service Attacks Tsunami |