Click here to download all references as Bib-File.

Enter keywords to filter the library entries below or Propose new Entry
2015-02-18G DataG Data
Babar: espionage software finally found and put under the microscope
Evilbunny SNOWGLOBE
2015-02-17SecurityAffairsPierluigi Paganini
Ali Baba, the APT group from the Middle East
Cleaver
2015-02-17AvastJan Širmer
Angry Android hacker hides Xbot malware in popular application icons
Xbot
2015-02-17Kaspersky LabsGhareeb Saad, Mohamad Amin Hasbini
The Desert Falcons targeted attacks
AridViper
2015-02-17Kaspersky LabsKurt Baumgartner, Maria Garnaeva
BE2 extraordinary plugins, Siemens targeting, dev fails
BlackEnergy
2015-02-16Kaspersky LabsGReAT
Equation: The Death Star of Malware Galaxy
DoubleFantasy EquationDrug Fanny GROK
2015-02-16Kaspersky LabsGReAT
Equation: The Death Star of Malware Galaxy
Fanny
2015-02-16Ars TechnicaDan Goodin
How “omnipotent” hackers tied to NSA hid for 14 years—and were found at last
Equation Group
2015-02-15WikipediaVarious
Carbanak
FIN7
2015-02-12Trend MicroSimon Huang
Mobile Malware Gang Steals Millions from South Korean Users
Yanbian Gang
2015-02-11FIRST TbilisiAndrzej Dereszowski
Turla-development & operations
Turla
2015-02-10CrowdStrikeCrowdStrike
Global Threat Intel Report
MAGNETIC SPIDER PALE PANDA PREDATOR PANDA SABRE PANDA SPICY PANDA WET PANDA
2015-02-10Johannes Bader's BlogJohannes Bader
The DGA of Banjori
Banjori
2015-02-09KrebsOnSecurityBrian Krebs
Anthem Breach May Have Started in April 2014
APT19
2015-02-06CrowdStrikeCrowdStrike
CrowdStrike Global Threat Intel Report 2014
BlackPOS CryptoLocker Derusbi Elise Enfal EvilGrab Gameover P2P HttpBrowser Medusa Mirage Naikon NetTraveler pirpi PlugX Poison Ivy Sakula RAT Sinowal sykipot taidoor
2015-02-05FireEyeDerek Gooley, Michael Lin
Anatomy of a Brute Force Campaign: The Story of Hee Thai Limited
XOR DDoS
2015-02-04Trend MicroBrooks Hong, Feike Hacquebord, Lambert Sun
Pawn Storm Update: iOS Espionage App Found
X-Agent
2015-02-01Trend MicroTrend Micro Threat Research Team
Operation Arid Viper - Bypassing the Iron Dome
2015-02-01Kaspersky SASGReAT
Carbanak APT: The Great Bank Robbery
Carbanak FIN7
2015-02-01Kaspersky LabsGReAT
The Desert Falcons Targeted Attacks
AridViper