Click here to download all references as Bib-File.•
2014-08-04
⋅
Palo Alto Networks Unit 42
⋅
New Release: Decrypting NetWire C2 Traffic NetWire RC |
2014-08-01
⋅
Coding and Security
⋅
Soraya Malware Analysis - Dropper soraya |
2014-07-31
⋅
G Data
⋅
Poweliks: the persistent malware without a file Poweliks |
2014-07-31
⋅
FireEye
⋅
Spy of the Tiger paladin APT24 |
2014-07-18
⋅
Virus Bulletin
⋅
Bird's nest neshta |
2014-07-16
⋅
StopMalvertising
⋅
Mini Analysis of the TinyBanker Tinba Tinba |
2014-07-15
⋅
Palo Alto Networks Unit 42
⋅
Unit 42 Technical Analysis: Seaduke SEADADDY |
2014-07-15
⋅
McAfee
⋅
Targeted Attacks on French Company Exploit Multiple Word Vulnerabilities APT24 |
2014-07-15
⋅
McAfee
⋅
Targeted Attacks on French Company Exploit Multiple Word Vulnerabilities PittyTiger RAT |
2014-07-11
⋅
Airbus Defence & Space
⋅
The Eye of the Tiger APT24 |
2014-07-11
⋅
SecurityIntelligence
⋅
The Father of Zeus: Kronos Malware Discovered |
2014-07-11
⋅
Airbus
⋅
The Eye of the Tiger APT24 |
2014-07-11
⋅
Airbus
⋅
The Eye of the Tiger APT24 |
2014-07-10
⋅
Kaspersky Labs
⋅
Versatile DDoS Trojan for Linux BillGates |
2014-07-10
⋅
Europol
⋅
Global Action Targeting Shylock Malware Shylock |
2014-07-09
⋅
FireEye
⋅
BrutPOS: RDP Bruteforcing Botnet Targeting POS Systems BrutPOS |
2014-07-07
⋅
Symantec
⋅
Dragonfly: Cyberespionage Attacks Against Energy Suppliers Karagany ENERGETIC BEAR |
2014-07-07
⋅
Symantec
⋅
Dragonfly: Cyberespionage Attacks Against Energy Suppliers ENERGETIC BEAR |
2014-07-07
⋅
Disect Android APKs like a Pro - Static code analysis Retefe |
2014-07-07
⋅
CrowdStrike
⋅
Deep in Thought: Chinese Targeting of National Security Think Tanks APT19 |