Click here to download all references as Bib-File.•
2016-06-17
⋅
Check Point
⋅
In The Wild: Mobile Malware Implements New Features Triada |
2016-06-17
⋅
Kaspersky Labs
⋅
Operation Daybreak StarCruft APT37 |
2016-06-17
⋅
Threatpost
⋅
ScarCruft APT Group Used Latest Flash Zero Day in Two Dozen Attacks APT37 |
2016-06-16
⋅
NCC Group
⋅
Sakula: an adventure in DLL planting |
2016-06-15
⋅
CrowdStrike
⋅
Bears in the Midst: Intrusion into the Democratic National Committee X-Agent ATI-Agent SEADADDY Seduploader X-Agent XTunnel APT28 |
2016-06-15
⋅
Trend Micro
⋅
Unsupported TeamViewer Versions Exploited For Backdoors, Keylogging TeamSpy |
2016-06-15
⋅
Fox-IT
⋅
Mofang: A politically motivated information stealing adversary Mofang |
2016-06-14
⋅
Palo Alto Networks Unit 42
⋅
New Sofacy Attacks Against US Government Agency Seduploader APT28 |
2016-06-14
⋅
Palo Alto Networks Unit 42
⋅
New Sofacy Attacks Against US Government Agency |
2016-06-14
⋅
Kaspersky Labs
⋅
CVE-2016-4171 – Adobe Flash Zero-day used in targeted attacks APT37 |
2016-06-14
⋅
Palo Alto Networks Unit 42
⋅
New Sofacy Attacks Against US Government Agency APT28 |
2016-06-13
⋅
⋅
Macnica Networks
⋅
Survey of the actual situation of the large-scale cyber spy activity that hit Japan | 1st edition Emdivi PlugX |
2016-06-11
⋅
The New York Times
⋅
The Chinese Hackers in the Back Office APT19 |
2016-06-10
⋅
Malwarebytes Labs
⋅
Petya and Mischa: ransomware duet (part 2) Petya |
2016-06-09
⋅
Microsoft
⋅
Reverse-engineering DUBNIUM DarkHotel |
2016-06-09
⋅
Microsoft
⋅
Reverse-engineering DUBNIUM DarkHotel |
2016-06-08
⋅
FireEye
⋅
Spear Phishing Attacks: Why They are Successful and How to Stop Them FIN8 |
2016-06-08
⋅
ClearSky
⋅
Operation DustySky Part 2 Molerats |
2016-06-07
⋅
Sogeti
⋅
The Story of yet another ransom-fail-ware Dharma |
2016-06-06
⋅
Kaspersky Labs
⋅
Everyone sees not what they want to see Triada |