Click here to download all references as Bib-File.•
2015-06-18
⋅
SWITCH Security Blog
⋅
So Long, and Thanks for All the Domains Tinba |
2015-06-17
⋅
Kaspersky Labs
⋅
The Spring Dragon APT Elise LOTUS PANDA |
2015-06-16
⋅
Palo Alto Networks Unit 42
⋅
Operation Lotus Blossom: A New Nation-State Cyberthreat? LOTUS PANDA |
2015-06-15
⋅
Secureworks
⋅
Stegoloader: A Stealthy Information Stealer StegoLoader |
2015-06-15
⋅
KrebsOnSecurity
⋅
Catching Up on the OPM Breach APT19 |
2015-06-12
⋅
Malwarebytes Labs
⋅
Unusual Exploit Kit Targets Chinese Users (Part 2) Chinad |
2015-06-10
⋅
Kaspersky Labs
⋅
The Mystery of Duqu 2.0: a sophisticated cyberespionage actor returns DuQu Unit 8200 |
2015-06-10
⋅
Kleissner & Associates
⋅
Pony + Pkybot + Automated Transfer System = Banker Pkybot |
2015-06-10
⋅
Win32/Upatre.BI - Part One Upatre |
2015-06-09
⋅
Check Point
⋅
New Data: Volatile Cedar Malware Campaign Volatile Cedar |
2015-06-04
⋅
Palo Alto Networks Unit 42
⋅
KeyBase Keylogger Malware Family Exposed KeyBase |
2015-06-03
⋅
ClearSky
⋅
Thamar Reservoir – An Iranian cyber-attack campaign against targets in the Middle East Rocket Kitten |
2015-06-03
⋅
ClearSky
⋅
Thamar Reservoir – An Iranian cyber-attack campaign against targets in the Middle East SamSam |
2015-06-01
⋅
CrowdStrike
⋅
Rhetoric Foreshadows Cyber Activity in the South China Sea APT23 |
2015-06-01
⋅
Check Point
⋅
“Troldesh” – New Ransomware from Russia Troldesh |
2015-06-01
⋅
Trend Micro
⋅
MalumPOS History and Characteristics MalumPOS |
2015-05-29
⋅
Kaspersky Labs
⋅
THE MsnMM CAMPAIGNS: The Earliest Naikon APT Campaigns APT30 Naikon |
2015-05-28
⋅
Malwarebytes Labs
⋅
Unusual Exploit Kit Targets Chinese Users (Part 1) Chinad |
2015-05-26
⋅
ESET Research
⋅
Moose – the router worm with an appetite for social networks Moose |
2015-05-23
⋅
FireEye
⋅
NitlovePOS: Another New POS Malware nitlove |