Click here to download all references as Bib-File.•
2013-12-12
⋅
Checkpoint
⋅
Malware Research Group HIMAN Malware Analysis himan |
2013-12-11
⋅
Norman Shark
⋅
The Chinese Malware Complexes: The Maudi Surveillance Operation Maudi |
2013-12-09
⋅
Trustwave
⋅
The Curious Case of the Malicious IIS Module IISniff |
2013-12-05
⋅
ESET Research
⋅
Did you sayAdvanced Persistent Threats? Terminator RAT |
2013-12-04
⋅
Cisco Talos
⋅
The Internet of Everything, Including Malware Zollard |
2013-11-10
⋅
FireEye
⋅
Operation Ephemeral Hydra: IE Zero-Day Linked to DeputyDog Uses Diskless Method 9002 RAT |
2013-11-09
⋅
T-cmd.cpp T-Cmd |
2013-11-06
⋅
CrowdStrike
⋅
VICEROY TIGER Delivers New Zero-Day Exploit VICEROY TIGER |
2013-11-05
⋅
F-Secure
⋅
Operation Hangover: Unveiling an Indian Cyberattack Infrastructure VICEROY TIGER |
2013-10-31
⋅
FireEye
⋅
Know Your Enemy: Tracking A Rapidly Evolving APT Actor Bozok Poison Ivy TEMPER PANDA |
2013-10-29
⋅
RSA Conference
⋅
Dissecting Banking Trojan Carberp Carberp |
2013-10-16
⋅
CrowdStrike
⋅
CrowdCasts Monthly: You Have an Adversary Problem ELECTRIC PANDA GIBBERISH PANDA TEST PANDA |
2013-10-14
⋅
Trend Micro
⋅
PE_MOFKSYS.A Mofksys |
2013-10-10
⋅
CrowdStrike
⋅
Regional Conflict and Cyber Blowback Corsair Jackal |
2013-10-01
⋅
MALWARE Conference
⋅
Highly Resilient Peer-to-Peer Botnets Are Here: An Analysis of Gameover Zeus Gameover P2P |
2013-09-26
⋅
Malwarebytes
⋅
New Solarbot Malware Debuts, Creator Publicly Advertising Solarbot |
2013-09-25
⋅
Avast
⋅
Win32/64:Napolar: New Trojan shines on the cyber crime-scene Solarbot |
2013-09-25
⋅
Kaspersky Labs
⋅
The Icefog APT: A Tale of Cloak and Three Daggers DAGGER PANDA |
2013-09-25
⋅
ESET Research
⋅
Win32/Napolar – A new bot on the block Solarbot |
2013-09-24
⋅
AT&T
⋅
OSX/Leverage.a Analysis Leverage |