Click here to download all references as Bib-File.

Enter keywords to filter the library entries below or Propose new Entry
2014-11-19Trend MicroJoie Salvio
ROVNIX Infects Systems with Password-Protected Macros
ReactorBot
2014-11-15Contagio DumpMila Parkour
OnionDuke samples
OnionDuke
2014-11-14SensepostEtienne Stalmans, Sam Hunter, Willem Mouton
reGeorg
reGeorg
2014-11-14F-SecureF-Secure Labs
OnionDuke: APT Attacks Via the Tor Network
OnionDuke
2014-11-13ZeroNightsAnton Cherepanov
Roaming tiger
Roaming Tiger
2014-11-13ABC NewsDylan Welch
Chinese hackers 'breach Australian media organisations' ahead of G20
APT19
2014-11-13ZeroNightsIvanov Boris
Computer Forensic Investigation of mobile Banking Trojan
FIN7
2014-11-13Trend MicroRhena Inocencio
BASHLITE Affects Devices Running on BusyBox
Bashlite
2014-11-12ESET ResearchRobert Lipovsky
Korplug military targeted attacks: Afghanistan & Tajikistan
DarkStRat
2014-11-11G DataG Data
The Uroburos case: new sophisticated RAT identified
Agent.BTZ Uroburos
2014-11-10Trend MicroWilliam Gamazo Sanchez
Timeline of Sandworm Attacks
Sandworm
2014-11-10Trend MicroWilliam Gamazo Sanchez
Timeline of Sandworm Attacks
Sandworm
2014-11-10Kaspersky LabsGReAT
The Darkhotel APT
DarkHotel
2014-11-10Kaspersky LabsGReAT
The Darkhotel APT
DarkHotel
2014-11-10Blaze's Security BlogBartBlaze
Thoughts on Absolute Computrace
Computrace
2014-11-08How-To-Hack.netH4ck
Review of jSpy a RAT from jSpy.net
jSpy
2014-11-04BitBucketDaniel Plohmann
IDApatchwork Repository
Nymaim
2014-11-03Kaspersky LabsKurt Baumgartner, Maria Garnaeva
BE2 custom plugins, router abuse, and target profiles
BlackEnergy
2014-11-01NovettaNovetta
ZoxPNG Analysis
BLACKCOFFEE
2014-10-31G DataG Data
OPERATION “TOOHASH”: HOW TARGETED ATTACKS WORK
Cohhoc ProjectWood Gelsemium