Click here to download all references as Bib-File.•
2014-03-12
⋅
FireEye
⋅
A Detailed Examination of the Siesta Campaign APT1 Siesta |
2014-03-12
⋅
Kaspersky Labs
⋅
Agent.btz: a Source of Inspiration? Agent.BTZ |
2014-03-07
⋅
G Data
⋅
Uroburos – Deeper travel into kernel protection mitigation Uroburos |
2014-03-06
⋅
Threatpost
⋅
Dexter, Project Hook POS Malware Campaigns Persist Project Hook POS |
2014-03-06
⋅
Trend Micro
⋅
The Siesta Campaign: A New Targeted Attack Awakens APT1 |
2014-03-05
⋅
Symantec
⋅
Android RATs Branch out with Dendroid Dendroid |
2014-03-01
⋅
ESET Research
⋅
OPERATION WINDIGO Ebury |
2014-03-01
⋅
Vinsula
⋅
ChewBacca – A TOR Based POS Malware ChewBacca |
2014-02-28
⋅
G Data Blog
⋅
Uroburos - highly complex espionage software with Russian roots Uroburos |
2014-02-24
⋅
RSA Conference
⋅
The Art of Attribution Identifying and Pursuing your Cyber Adversaries ANDROMEDA SPIDER APT19 DEXTOROUS SPIDER Ghost Jackal Silent Chollima SINGING SPIDER Tonto Team TOXIC PANDA UNION SPIDER |
2014-02-23
⋅
Symantec
⋅
Trojan.Sakurel Sakula RAT |
2014-02-21
⋅
SonicWall
⋅
CVE 2014-0322 Malware - Sakurel (Feb 21, 2014) Sakula RAT |
2014-02-21
⋅
ESET Research
⋅
An In‑depth Analysis of Linux/Ebury Ebury |
2014-02-19
⋅
FireEye
⋅
XtremeRAT: Nuisance or Threat? Xtreme RAT |
2014-02-17
⋅
Malwarebytes
⋅
Hiding in plain sight: a story about a sneaky banking Trojan KINS VM Zeus |
2014-02-16
⋅
Put As blog
⋅
Analysis of CoinThief/A "dropper" CoinThief |
2014-02-15
⋅
McAfee
⋅
Examining Your Very Own Sefnit Trojan Mevade |
2014-02-14
⋅
Secureworks
⋅
Analysis of DHS NCCIC Indicators jspRAT BeepService DDKeylogger LinseningSvr ONHAT SimpleFileMover ZiyangRAT |
2014-02-10
⋅
Kaspersky Labs
⋅
The Careto/Mask APT: Frequently Asked Questions Careto |
2014-02-06
⋅
⋅
Habr
⋅
Исследуем Linux Botnet «BillGates» BillGates |