Click here to download all references as Bib-File.•
2014-11-19
⋅
Trend Micro
⋅
ROVNIX Infects Systems with Password-Protected Macros ReactorBot |
2014-11-15
⋅
Contagio Dump
⋅
OnionDuke samples OnionDuke |
2014-11-14
⋅
Sensepost
⋅
reGeorg reGeorg |
2014-11-14
⋅
F-Secure
⋅
OnionDuke: APT Attacks Via the Tor Network OnionDuke |
2014-11-13
⋅
ZeroNights
⋅
Roaming tiger Roaming Tiger |
2014-11-13
⋅
ABC News
⋅
Chinese hackers 'breach Australian media organisations' ahead of G20 APT19 |
2014-11-13
⋅
ZeroNights
⋅
Computer Forensic Investigation of mobile Banking Trojan FIN7 |
2014-11-13
⋅
Trend Micro
⋅
BASHLITE Affects Devices Running on BusyBox Bashlite |
2014-11-12
⋅
ESET Research
⋅
Korplug military targeted attacks: Afghanistan & Tajikistan DarkStRat |
2014-11-11
⋅
G Data
⋅
The Uroburos case: new sophisticated RAT identified Agent.BTZ Uroburos |
2014-11-10
⋅
Trend Micro
⋅
Timeline of Sandworm Attacks Sandworm |
2014-11-10
⋅
Trend Micro
⋅
Timeline of Sandworm Attacks Sandworm |
2014-11-10
⋅
Kaspersky Labs
⋅
The Darkhotel APT DarkHotel |
2014-11-10
⋅
Kaspersky Labs
⋅
The Darkhotel APT DarkHotel |
2014-11-10
⋅
Blaze's Security Blog
⋅
Thoughts on Absolute Computrace Computrace |
2014-11-08
⋅
How-To-Hack.net
⋅
Review of jSpy a RAT from jSpy.net jSpy |
2014-11-04
⋅
BitBucket
⋅
IDApatchwork Repository Nymaim |
2014-11-03
⋅
Kaspersky Labs
⋅
BE2 custom plugins, router abuse, and target profiles BlackEnergy |
2014-11-01
⋅
Novetta
⋅
ZoxPNG Analysis BLACKCOFFEE |
2014-10-31
⋅
G Data
⋅
OPERATION “TOOHASH”: HOW TARGETED ATTACKS WORK Cohhoc ProjectWood Gelsemium |