Click here to download all references as Bib-File.

Enter keywords to filter the library entries below or Propose new Entry
2014-07-03F-SecureF-Secure Labs
COSMICDUKE: Cosmu with a twist of MiniDuke
CosmicDuke
2014-07-02Trend MicroKervin Alintanahin, Ronnie Giagone
KIVARS With Venom: Targeted Attacks Upgrade with 64-bit “Support”
FakeWord KIVARS PLEAD Poison RAT Zeus
2014-06-27SophosLabsGabor Szappanos
PlugX - The Next Generation
PlugX
2014-06-23F-SecureDaavid
Havex Hunts For ICS/SCADA Systems
Havex RAT
2014-06-18Malware Don't Need CoffeeKafeine
Neutrino Bot (aka MS:Win32/Kasidet)
Neutrino
2014-06-10FireEyeMike Scott
Clandestine Fox, Part Deux
PlugX
2014-06-09CrowdStrikeCrowdStrike
Crowdstrike Intelligence Report: Putter Panda
4h_rat
2014-06-09SecurityIntelligenceDana Tamir
ZeuS.Maple Variant Targets Canadian Online Banking Customers
KINS
2014-06-09CrowdStrikeCrowdstrike Global intelliGenCe team
CrowdStrike Intelligence Report: Putter Panda
APT2
2014-06-04Lab of a Penetration TesterNikhil Mittal
Introducing Antak - A webshell which utilizes powershell
ANTAK
2014-06-02Virus BulletinChao Chen
Sinowal banking trojan
Sinowal
2014-06-02G DataG Data
Analysis of Uroburos, using WinDbg
Uroburos
2014-06-02FireEyeTimothy Dahms
Molerats, Here for Spring!
Molerats
2014-05-30MalwarebytesAdam Kujawa
Taking off the Blackshades
BlackShades
2014-05-29The Washington TimesCheryl K. Chumley
Iranian hackers sucker punch U.S. defense officials with creative social-media scam
Charming Kitten
2014-05-28iSIGHT Partners (FireEye)iSIGHT Partners
NEWSCASTER: An Iranian Threat Within Social Networks
Charming Kitten
2014-05-22SecurityIntelligenceDana Tamir
Meet the Zberp Trojan
VM Zeus
2014-05-19The New York TimesDavid E. Sanger, Michael S. Schmidt
5 in China Army Face U.S. Charges of Cyberattacks
APT1
2014-05-16SecureworksParam Singh
APT Campaign Leverages the Cueisfry Trojan and Microsoft Word Vulnerability CVE-2014-1761
Cueisfry
2014-05-15Dr.WebDr. Web
DDoS Trojans attack Linux
MrBlack