Click here to download all references as Bib-File.•
2014-02-24
⋅
RSA Conference
⋅
The Art of Attribution Identifying and Pursuing your Cyber Adversaries ANDROMEDA SPIDER APT19 DEXTOROUS SPIDER Ghost Jackal Silent Chollima SINGING SPIDER Tonto Team TOXIC PANDA UNION SPIDER |
2014-01-01
⋅
Council on Foreign Relations
⋅
Operation Cleaver Cleaver |
2014-01-01
⋅
FireEye
⋅
APT28: A Windows into Russia's Cyber Espionage Operations? OLDBAIT |
2013-11-05
⋅
F-Secure
⋅
Operation Hangover: Unveiling an Indian Cyberattack Infrastructure VICEROY TIGER |
2013-10-10
⋅
CrowdStrike
⋅
Regional Conflict and Cyber Blowback Corsair Jackal |
2013-09-25
⋅
Avast
⋅
Win32/64:Napolar: New Trojan shines on the cyber crime-scene Solarbot |
2013-08-23
⋅
FireEye
⋅
Operation Molerats: Middle East Cyber Attacks Using Poison Ivy Poison Ivy Molerats |
2013-06-26
⋅
Symantec
⋅
Four Years of DarkSeoul Cyberattacks Against South Korea Continue on Anniversary of Korean War Lazarus Group |
2013-06-26
⋅
Symantec
⋅
Four Years of DarkSeoul Cyberattacks Against South Korea Continue on Anniversary of Korean War Lazarus Group |
2013-06-04
⋅
Kaspersky Labs
⋅
Kaspersky Lab Uncovers ‘Operation NetTraveler,’ a Global Cyberespionage Campaign Targeting Government-Affiliated Organizations and Research Institutes APT21 |
2013-03-20
⋅
The New York Times
⋅
Computer Networks in South Korea Are Paralyzed in Cyberattacks Lazarus Group |
2013-03-20
⋅
Kaspersky Labs
⋅
The ‘TeamSpy’ Story -Abusing TeamViewer in Cyberespionage Campaigns TeamSpy Crew |
2013-03-20
⋅
Kaspersky Labs
⋅
The TeamSpy Crew Attacks – Abusing TeamViewer for Cyberespionage TeamSpy Crew |
2013-02-22
⋅
Microsoft
⋅
Recent Cyberattacks WildNeutron |
2013-02-19
⋅
FireEye
⋅
APT1: Exposing One of China’s Cyber Espionage Units APT1 |
2013-01-14
⋅
Kaspersky Labs
⋅
“Red October” Diplomatic Cyber Attacks Investigation Inception Framework |
2013-01-14
⋅
Kaspersky Labs
⋅
The “Red October” Campaign – An Advanced Cyber Espionage Network Targeting Diplomatic and Government Agencies Inception Framework |
2013-01-14
⋅
Kaspersky Labs
⋅
"Red October" Diplomatic Cyber Attacks Investigation Inception Framework |
2013-01-01
⋅
McAfee
⋅
Dissecting Operation Troy: Cyberespionage in South Korea httpdropper |
2012-11-05
⋅
Malwarebytes
⋅
Citadel: a cyber-criminal’s ultimate weapon? Citadel |