Click here to download all references as Bib-File.

Enter keywords to filter the library entries below or Propose new Entry
2014-06-02G DataG Data
Analysis of Uroburos, using WinDbg
Uroburos
2014-06-02FireEyeTimothy Dahms
Molerats, Here for Spring!
Molerats
2014-05-30MalwarebytesAdam Kujawa
Taking off the Blackshades
BlackShades
2014-05-29The Washington TimesCheryl K. Chumley
Iranian hackers sucker punch U.S. defense officials with creative social-media scam
Charming Kitten
2014-05-28iSIGHT Partners (FireEye)iSIGHT Partners
NEWSCASTER: An Iranian Threat Within Social Networks
Charming Kitten
2014-05-22SecurityIntelligenceDana Tamir
Meet the Zberp Trojan
VM Zeus
2014-05-19The New York TimesDavid E. Sanger, Michael S. Schmidt
5 in China Army Face U.S. Charges of Cyberattacks
APT1
2014-05-16SecureworksParam Singh
APT Campaign Leverages the Cueisfry Trojan and Microsoft Word Vulnerability CVE-2014-1761
Cueisfry
2014-05-15Dr.WebDr. Web
DDoS Trojans attack Linux
MrBlack
2014-05-13CrowdStrikeMatt Dahl
Cat Scratch Fever: CrowdStrike Tracks Newly Reported Iranian Actor as FLYING KITTEN
Flying Kitten
2014-05-13G DataG Data
Uroburos rootkit: Belgian Foreign Ministry stricken
Uroburos
2014-05-06MalwareTechMalwareTech
Rovnix new “evolution”
Rovnix
2014-05-05Kevin Breen
VT Comments Page on Blue Banana Sample
Blue Banana RAT
2014-05-01Recorded FutureChris
Hunting Hidden Lynx: How OSINT is Crucial for APT Analysis
APT17
2014-05-01Arbor NetworksASERT Threat Intelligence
Into the Light of Day:Uncovering Ongoing and Historical Point of Sale Malware and Attack Campaigns
poscardstealer
2014-04-27StopMalvertisingKimberly
Analysis of the Predator Pain Keylogger
HawkEye Keylogger
2014-04-21WikipediaVarious
Hacking Team
Hacking Team
2014-04-18Trend MicroAlvin John Nieto
TROJ64_WOWLIK.VT
Alureon
2014-04-17Nettitude LabsNettitude Labs
A quick analysis of the latest Shadow Brokers dump
DarkPulsar
2014-04-15My infected computerZairon
Trojan banking
KrBanker