Click here to download all references as Bib-File.•
2015-12-08
⋅
The Citizenlab
⋅
Packrat: Seven Years of a South American Threat Actor AdWind Adzok CyberGate Xtreme RAT Packrat |
2015-12-07
⋅
FireEye
⋅
Thriving Beyond The Operating System: Financial Threat Group Targets Volume Boot Record FIN1 |
2015-12-01
⋅
FireEye
⋅
China-based Cyber Threat Group Uses Dropbox for Malware Communications and Targets Hong Kong Media Outlets BUBBLEWRAP LOWBALL TEMPER PANDA |
2015-11-11
⋅
Proofpoint
⋅
AbaddonPOS: A new point of sale threat linked to Vawtrak AbaddonPOS TinyLoader |
2015-09-10
⋅
FireEye
⋅
Hangul Word Processor (HWP)Zero-Day: possible ties to North Korean threat actors HOPLIGHT |
2015-08-17
⋅
F-Secure Labs
⋅
THE DUKES 7 YEARS OF RUSSIAN CYBERESPIONAGE COZYDUKE GeminiDuke |
2015-08-05
⋅
Secureworks
⋅
Threat Group 3390 Cyberespionage APT27 |
2015-08-05
⋅
Secureworks
⋅
Threat Group 3390 Cyberespionage |
2015-07-29
⋅
Youtube (FireEye Inc.)
⋅
HAMMERTOSS: Stealthy Tactics Define a Russian Cyber Threat Group tDiscoverer |
2015-07-08
⋅
Kaspersky Labs
⋅
Wild Neutron – Economic espionage threat actor returns with new tricks JripBot |
2015-07-08
⋅
Kaspersky Labs
⋅
Wild Neutron – Economic espionage threat actor returns with new tricks WildNeutron |
2015-07-01
⋅
FireEye
⋅
HAMMERTOSS: Stealthy Tactics Define a Russian Cyber Threat Group tDiscoverer APT29 |
2015-05-13
⋅
Cylance
⋅
Cylance SPEAR Team: A Threat Actor Resurfaces GreenShaitan |
2015-05-04
⋅
Cisco Talos
⋅
Threat Spotlight: Rombertik – Gazing Past the Smoke, Mirrors, and Trapdoors Rombertik |
2015-04-27
⋅
Cisco Talos
⋅
Threat Spotlight: TeslaCrypt – Decrypt It Yourself TeslaCrypt |
2015-03-30
⋅
Symantec
⋅
New reconnaissance threat Trojan.Laziok targets the energy sector Laziok |
2015-03-20
⋅
Cisco Talos
⋅
Threat Spotlight: PoSeidon, A Deep Dive Into Point of Sale Malware FindPOS |
2015-02-25
⋅
Trend Micro
⋅
OPERATION ARID VIPER: Bypassing the Iron Dome AridViper |
2015-02-10
⋅
CrowdStrike
⋅
Global Threat Intel Report MAGNETIC SPIDER PALE PANDA PREDATOR PANDA SABRE PANDA SPICY PANDA WET PANDA |
2015-02-06
⋅
CrowdStrike
⋅
CrowdStrike Global Threat Intel Report 2014 BlackPOS CryptoLocker Derusbi Elise Enfal EvilGrab Gameover P2P HttpBrowser Medusa Mirage Naikon NetTraveler pirpi PlugX Poison Ivy Sakula RAT Sinowal sykipot taidoor |