Click here to download all references as Bib-File.•
2013-12-31
⋅
VirusTotal
⋅
VirusTotal Report for Bee Bee |
2013-12-18
⋅
Secureworks
⋅
CryptoLocker Ransomware CryptoLocker |
2013-12-18
⋅
ESET Research
⋅
Qadars – a banking Trojan with the Netherlands in its sights Qadars |
2013-12-17
⋅
Gdata
⋅
Bebloh – a well-known banking Trojan with noteworthy innovations UrlZone |
2013-12-12
⋅
FireEye Inc
⋅
OPERATION “KE3CHANG”:Targeted Attacks Against Ministries of Foreign Affairs Tidepool APT15 |
2013-12-12
⋅
Checkpoint
⋅
Malware Research Group HIMAN Malware Analysis himan |
2013-12-11
⋅
Norman Shark
⋅
The Chinese Malware Complexes: The Maudi Surveillance Operation Maudi |
2013-12-09
⋅
Trustwave
⋅
The Curious Case of the Malicious IIS Module IISniff |
2013-12-05
⋅
ESET Research
⋅
Did you sayAdvanced Persistent Threats? Terminator RAT |
2013-12-04
⋅
Cisco Talos
⋅
The Internet of Everything, Including Malware Zollard |
2013-11-10
⋅
FireEye
⋅
Operation Ephemeral Hydra: IE Zero-Day Linked to DeputyDog Uses Diskless Method 9002 RAT |
2013-11-09
⋅
T-cmd.cpp T-Cmd |
2013-11-06
⋅
CrowdStrike
⋅
VICEROY TIGER Delivers New Zero-Day Exploit VICEROY TIGER |
2013-11-05
⋅
F-Secure
⋅
Operation Hangover: Unveiling an Indian Cyberattack Infrastructure VICEROY TIGER |
2013-10-31
⋅
FireEye
⋅
Know Your Enemy: Tracking A Rapidly Evolving APT Actor Bozok Poison Ivy TEMPER PANDA |
2013-10-29
⋅
RSA Conference
⋅
Dissecting Banking Trojan Carberp Carberp |
2013-10-16
⋅
CrowdStrike
⋅
CrowdCasts Monthly: You Have an Adversary Problem ELECTRIC PANDA GIBBERISH PANDA TEST PANDA |
2013-10-14
⋅
Trend Micro
⋅
PE_MOFKSYS.A Mofksys |
2013-10-10
⋅
CrowdStrike
⋅
Regional Conflict and Cyber Blowback Corsair Jackal |
2013-10-01
⋅
MALWARE Conference
⋅
Highly Resilient Peer-to-Peer Botnets Are Here: An Analysis of Gameover Zeus Gameover P2P |