Click here to download all references as Bib-File.•
2015-02-18
⋅
G Data
⋅
Babar: espionage software finally found and put under the microscope Evilbunny SNOWGLOBE |
2015-02-17
⋅
SecurityAffairs
⋅
Ali Baba, the APT group from the Middle East Cleaver |
2015-02-17
⋅
Avast
⋅
Angry Android hacker hides Xbot malware in popular application icons Xbot |
2015-02-17
⋅
Kaspersky Labs
⋅
The Desert Falcons targeted attacks AridViper |
2015-02-17
⋅
Kaspersky Labs
⋅
BE2 extraordinary plugins, Siemens targeting, dev fails BlackEnergy |
2015-02-16
⋅
Kaspersky Labs
⋅
Equation: The Death Star of Malware Galaxy DoubleFantasy EquationDrug Fanny GROK |
2015-02-16
⋅
Kaspersky Labs
⋅
Equation: The Death Star of Malware Galaxy Fanny |
2015-02-16
⋅
Ars Technica
⋅
How “omnipotent” hackers tied to NSA hid for 14 years—and were found at last Equation Group |
2015-02-15
⋅
Wikipedia
⋅
Carbanak FIN7 |
2015-02-12
⋅
Trend Micro
⋅
Mobile Malware Gang Steals Millions from South Korean Users Yanbian Gang |
2015-02-11
⋅
FIRST Tbilisi
⋅
Turla-development & operations Turla |
2015-02-10
⋅
CrowdStrike
⋅
Global Threat Intel Report MAGNETIC SPIDER PALE PANDA PREDATOR PANDA SABRE PANDA SPICY PANDA WET PANDA |
2015-02-10
⋅
Johannes Bader's Blog
⋅
The DGA of Banjori Banjori |
2015-02-09
⋅
KrebsOnSecurity
⋅
Anthem Breach May Have Started in April 2014 APT19 |
2015-02-06
⋅
CrowdStrike
⋅
CrowdStrike Global Threat Intel Report 2014 BlackPOS CryptoLocker Derusbi Elise Enfal EvilGrab Gameover P2P HttpBrowser Medusa Mirage Naikon NetTraveler pirpi PlugX Poison Ivy Sakula RAT Sinowal sykipot taidoor |
2015-02-05
⋅
FireEye
⋅
Anatomy of a Brute Force Campaign: The Story of Hee Thai Limited XOR DDoS |
2015-02-04
⋅
Trend Micro
⋅
Pawn Storm Update: iOS Espionage App Found X-Agent |
2015-02-01
⋅
Trend Micro
⋅
Operation Arid Viper - Bypassing the Iron Dome |
2015-02-01
⋅
Kaspersky SAS
⋅
Carbanak APT: The Great Bank Robbery Carbanak FIN7 |
2015-02-01
⋅
Kaspersky Labs
⋅
The Desert Falcons Targeted Attacks AridViper |