Click here to download all references as Bib-File.•
2015-09-23
⋅
Johannes Bader's Blog
⋅
Ranbyus's DGA, Revisited Ranbyus |
2015-09-23
⋅
SpiderLabs Blog
⋅
Quaverse RAT: Remote-Access-as-a-Service QRat |
2015-09-23
⋅
Palo Alto Networks Unit 42
⋅
Chinese Actors Use ‘3102’ Malware in Attacks on US Government and EU Media 9002 RAT |
2015-09-23
⋅
Palo Alto Networks Unit 42
⋅
Chinese Actors Use ‘3102’ Malware in Attacks on US Government and EU Media APT.3102 |
2015-09-18
⋅
Proofpoint
⋅
Operation Arid Viper Slithers Back into View AridViper |
2015-09-17
⋅
F-Secure
⋅
The Dukes: 7 Years Of Russian Cyber-Espionage APT29 |
2015-09-17
⋅
Trend Micro
⋅
Operation Iron Tiger: Exploring Chinese Cyber-Espionage Attacks on United States Defense Contractors APT27 |
2015-09-16
⋅
Trend Micro
⋅
Operation Iron Tiger: Attackers Shift from East Asia to the United States APT27 |
2015-09-15
⋅
Proofpoint
⋅
In Pursuit of Optical Fibers and Troop Intel: Targeted Attack Distributes PlugX in Russia PlugX |
2015-09-14
⋅
Kaspersky Labs
⋅
The Shade Encryptor: a Double Threat CMSBrute Troldesh |
2015-09-12
⋅
Archive-org
⋅
Stuxnet code Unit 8200 |
2015-09-11
⋅
Raytheon Blackbird Technologies
⋅
20150911-280-CSIT-15085 NfLog IsSpace |
2015-09-11
⋅
FireEye
⋅
SUCEFUL: Next Generation ATM Malware SUCEFUL |
2015-09-11
⋅
GovCERT.ch
⋅
Fobber Analysis Fobber |
2015-09-11
⋅
GovCERT.ch
⋅
Analysing a new eBanking Trojan called Fobber Fobber |
2015-09-10
⋅
FireEye
⋅
Hangul Word Processor (HWP)Zero-Day: possible ties to North Korean threat actors HOPLIGHT |
2015-09-09
⋅
KnowBe4
⋅
Pony Stealer Malware Pony |
2015-09-09
⋅
Kaspersky Labs
⋅
Satellite Turla: APT Command and Control in the Sky Turla |
2015-09-09
⋅
Kaspersky Labs
⋅
Satellite Turla: APT Command and Control in the Sky Satellite Turla Turla |
2015-09-08
⋅
FireEye
⋅
Two for One: Microsoft Office Encapsulated PostScriptand Windows Privilege Escalation Zero-Days REDSALT |