Click here to download all references as Bib-File.

Enter keywords to filter the library entries below or Propose new Entry
2015-04-15TrustwaveEric Merritt
New POS Malware Emerges - Punkey
Punkey POS
2015-04-15ByteAtlas
Knowledge Fragment: Bruteforcing Andromeda Configuration Buffers
Andromeda
2015-04-15Kaspersky LabsCostin Raiu, Maxim Golovkin
The Chronicles of the Hellsing APT: the Empire Strikes Back
Hellsing
2015-04-15Ars TechnicaDan Goodin
Elite cyber crime group strikes back after attack by rival APT gang
APT15
2015-04-14Youtube (Kaspersky)Kris McConkey
Following APT OpSec failures
BLACKCOFFEE Mangzamel APT17
2015-04-14Palo Alto Networks Unit 42Jen Miller-Osborn, Josh Grunzweig
Unit 42 Identifies New DragonOK Backdoor Malware Deployed Against Japanese Targets
DragonOK
2015-04-14Palo Alto Networks Unit 42Jen Miller-Osborn, Josh Grunzweig
Unit 42 Identifies New DragonOK Backdoor Malware Deployed Against Japanese Targets
FormerFirstRAT
2015-04-13CrowdStrikeDmitri Alperovitch
Cyber Deterrence in Action? A story of one long HURRICANE PANDA campaign
HURRICANE PANDA
2015-04-13CERT Societe GeneraleCERT Societe Generale
Analyzing Gootkit's persistence mechanism (new ASEP inside!)
GootKit
2015-04-13Hybrid-AnalysisHybrid-Analysis
sqlconnt1.exe
Mangzamel
2015-04-13CrowdStrikeDmitri Alperovitch
Cyber Deterrence in Action? A story of one long HURRICANE PANDA campaign
HURRICANE PANDA
2015-04-12Trend MicroTrend Micro
SIMDA: A Botnet Takedown
Simda
2015-04-09Trend MicroDianne Lagrimas
Beebone Botnet Takedown: Trend Micro Solutions
Vobfus
2015-04-09Kaspersky LabsAlexey Shulmin
The Banking Trojan Emotet: Detailed Analysis
Emotet
2015-04-09ESET ResearchJean-Ian Boutin
Operation Buhtrap, the trap for Russian accountants
Buhtrap BuhTrap
2015-04-06NovettaNovetta
WINNTI ANALYSIS
Winnti
2015-04-01FireEyeFireEye
APT30 AND THE MECHANICS OF A LONG-RUNNING CYBER ESPIONAGE OPERATION
BACKBEND backspace CREAMSICLE FLASHFLOOD GEMCUTTER MILKMAID Naikon NETEAGLE ORANGEADE SHIPSHAPE SPACESHIP SslMM Sys10 WinMM xsPlus APT30
2015-04-01Trend MicroJay Yaneza
NewPosThings Has New PoS Things
NewPosThings
2015-03-31Check Point ResearchCheck Point Research
Volatile Cedar - Analysis of a Global Cyber Espionage Campaign
Volatile Cedar
2015-03-31Kaspersky LabsCostin Raiu, Kurt Baumgartner
Sinkholing Volatile Cedar DGA Infrastructure
Volatile Cedar