Click here to download all references as Bib-File.

Enter keywords to filter the library entries below or Propose new Entry
2013-01-30Joseph Bingham
Backdoor.Barkiofork Targets Aerospace and Defense Industry
barkiofork
2013-01-27Xylibox BlogXylitol
Trojan.Win32/Spy.Ranbyus
Ranbyus
2013-01-25Xylitol
vSkimmer, Another POS malware
vSkimmer
2013-01-24ESET ResearchSébastien Duquette
Linux/SSHDoor.A Backdoored SSH daemon that steals passwords
SSHDoor
2013-01-21Trend MicroMark Joseph Manahan
Shylock Not the Lone Threat Targeting Skype
Phorpiex
2013-01-19SpamhausThomas Morrison
Cooperative Efforts To Shut Down Virut Botnet
Virut
2013-01-18abuse.chabuse.ch
Feodo Tracker
Emotet
2013-01-18Contagiodump BlogMila Parkour
Dec 2012 Batchwiper Samples
BatchWiper
2013-01-18Brian Krebs
Polish Takedown Targets ‘Virut’ Botnet
Virut
2013-01-17Kaspersky LabsGReAT
“Red October” – Part Two, the Modules
Inception Framework
2013-01-14Kaspersky LabsGReAT
“Red October” Diplomatic Cyber Attacks Investigation
Inception Framework
2013-01-14Kaspersky LabsGReAT
The “Red October” Campaign – An Advanced Cyber Espionage Network Targeting Diplomatic and Government Agencies
Inception Framework
2013-01-14Kaspersky LabsGReAT
"Red October" Diplomatic Cyber Attacks Investigation
Inception Framework
2013-01-02Eric Romang
Capstone Turbine Corporation Also Targeted in the CFR Watering Hole Attack And More
APT19
2013-01-01FireEyeAlex Lanstein
APTs By The Dozen: Dissecting Advanced Attacks
Korlia
2013-01-01McAfeeItai Liba, James Walter, Ryan Sherstobitoff
Dissecting Operation Troy: Cyberespionage in South Korea
httpdropper
2013-01-01NetSupport ManagerNetSupport Manager
NetSupport Manager Website
NetSupportManager RAT
2013-01-01Trend MicroJessa dela Torre, Nart Villeneuve
FAKEM RAT
Terminator RAT
2013-01-01SymantecPiotr Krysiuk, Vikram Thakur
Trojan.Bamital
Bamital
2012-12-29Eric Romang BlogEric Romang
Attack and IE 0day Informations Used Against Council on Foreign Relations
APT19