Click here to download all references as Bib-File.

Enter keywords to filter the library entries below or Propose new Entry
2016-06-22Trend MicroJoseph C Chen
After Angler: Shift in Exploit Kit Landscape and New Crypto-Ransomware Activity
GooPic Drooper
2016-06-21FortinetFloser Bacurio, Roland Dela Paz
The Curious Case of an Unknown Trojan Targeting German-Speaking Users
Zloader
2016-06-17Check PointOren Koriat
In The Wild: Mobile Malware Implements New Features
Triada
2016-06-17Kaspersky LabsAnton Ivanov, Costin Raiu
Operation Daybreak
StarCruft APT37
2016-06-17ThreatpostMichael Mimoso
ScarCruft APT Group Used Latest Flash Zero Day in Two Dozen Attacks
APT37
2016-06-16NCC GroupDavid Cannings
Sakula: an adventure in DLL planting
2016-06-15CrowdStrikeDmitri Alperovitch
Bears in the Midst: Intrusion into the Democratic National Committee
X-Agent ATI-Agent SEADADDY Seduploader X-Agent XTunnel APT28
2016-06-15Trend MicroTrend Micro
Unsupported TeamViewer Versions Exploited For Backdoors, Keylogging
TeamSpy
2016-06-15Fox-ITFox IT
Mofang: A politically motivated information stealing adversary
Mofang
2016-06-14Palo Alto Networks Unit 42Bryan Lee, Robert Falcone
New Sofacy Attacks Against US Government Agency
Seduploader APT28
2016-06-14Palo Alto Networks Unit 42Bryan Lee, Robert Falcone
New Sofacy Attacks Against US Government Agency
2016-06-14Kaspersky LabsCostin Raiu
CVE-2016-4171 – Adobe Flash Zero-day used in targeted attacks
APT37
2016-06-14Palo Alto Networks Unit 42Bryan Lee, Robert Falcone
New Sofacy Attacks Against US Government Agency
APT28
2016-06-13Macnica NetworksMacnica Networks
Survey of the actual situation of the large-scale cyber spy activity that hit Japan | 1st edition
Emdivi PlugX
2016-06-11The New York TimesNicole Perlroth
The Chinese Hackers in the Back Office
APT19
2016-06-10Malwarebytes Labshasherezade
Petya and Mischa: ransomware duet (part 2)
Petya
2016-06-09MicrosoftMicrosoft Defender ATP Research Team
Reverse-engineering DUBNIUM
DarkHotel
2016-06-09MicrosoftJeong Wook Oh
Reverse-engineering DUBNIUM
DarkHotel
2016-06-08FireEyeFireEye
Spear Phishing Attacks: Why They are Successful and How to Stop Them
FIN8
2016-06-08ClearSkyClearSky Research Team
Operation DustySky Part 2
Molerats