Click here to download all references as Bib-File.•
2015-08-14
⋅
Raytheon Blackbird Technologies
⋅
Stalker Panda Tick |
2015-08-12
⋅
Wikipedia
⋅
Islamic State Hacking Division Cyber Caliphate Army |
2015-08-12
⋅
SecurityIntelligence
⋅
Tinba Trojan Sets Its Sights on Romania Tinba |
2015-08-10
⋅
Coding Stuffs
⋅
Fobber Code Decryption Fobber |
2015-08-10
⋅
shadowserver
⋅
The Italian Connection: An analysis of exploit supply chains and digital quartermasters smac APT20 |
2015-08-10
⋅
Palo Alto Networks Unit 42
⋅
What’s Next in Malware After Kuluoz? Asprox |
2015-08-10
⋅
Kaspersky Labs
⋅
Darkhotel’s attacks in 2015 DarkHotel DarkHotel |
2015-08-06
⋅
Symantec
⋅
The Black Vine cyberespionage group Sakula RAT APT19 |
2015-08-06
⋅
CrowdStrike
⋅
Bringing A Cannon To A Knife Fight |
2015-08-06
⋅
Symantec
⋅
The Black Vine cyberespionage group |
2015-08-05
⋅
Secureworks
⋅
Threat Group 3390 Cyberespionage APT27 |
2015-08-05
⋅
Secureworks
⋅
Threat Group 3390 Cyberespionage |
2015-08-05
⋅
Ars Technica
⋅
Newly discovered Chinese hacking group hacked 100+ websites to use as “watering holes” APT27 |
2015-08-05
⋅
Black Hat
⋅
Gameover Zeus – Bad Guys and Backends Gameover P2P |
2015-08-05
⋅
Malwarebytes
⋅
Who’s Behind Your Proxy? Uncovering Bunitu’s Secrets Bunitu |
2015-08-01
⋅
Arbor Networks
⋅
Uncovering the Seven Pointed Dagger 9002 RAT EvilGrab PlugX Trochilus RAT APT9 |
2015-08-01
⋅
root9b
⋅
TECHNICAL FOLLOW UP - APT28 XTunnel |
2015-07-31
⋅
AlienVault OTX
⋅
OTX: FBI Flash #68 (PlugX) APT9 |
2015-07-31
⋅
AlienVault
⋅
OTX Pulse on PlugX |
2015-07-30
⋅
ESET Research
⋅
Operation Potao Express: Analysis of a cyber‑espionage toolkit FakeTC |