Click here to download all references as Bib-File.

Enter keywords to filter the library entries below or Propose new Entry
2013-12-31VirusTotalVirusTotal
VirusTotal Report for Bee
Bee
2013-12-18SecureworksKeith Jarvis
CryptoLocker Ransomware
CryptoLocker
2013-12-18ESET ResearchJean-Ian Boutin
Qadars – a banking Trojan with the Netherlands in its sights
Qadars
2013-12-17Gdata
Bebloh – a well-known banking Trojan with noteworthy innovations
UrlZone
2013-12-12FireEye IncJames T. Bennett, Kenneth Geers, Mike Scott, Nart Villeneuve, Ned Moran, Thoufique Haq
OPERATION “KE3CHANG”:Targeted Attacks Against Ministries of Foreign Affairs
Tidepool APT15
2013-12-12CheckpointCheckpoint
Malware Research Group HIMAN Malware Analysis
himan
2013-12-11Norman SharkSnorre Fagerland
The Chinese Malware Complexes: The Maudi Surveillance Operation
Maudi
2013-12-09TrustwaveJosh Grunzweig
The Curious Case of the Malicious IIS Module
IISniff
2013-12-05ESET ResearchESET Research
Did you sayAdvanced Persistent Threats?
Terminator RAT
2013-12-04Cisco TalosCraig Williams
The Internet of Everything, Including Malware
Zollard
2013-11-10FireEyeMike Scott, Ned Moran, Sai Omkar Vashisht, Thoufique Haq
Operation Ephemeral Hydra: IE Zero-Day Linked to DeputyDog Uses Diskless Method
9002 RAT
2013-11-09TOo2y
T-cmd.cpp
T-Cmd
2013-11-06CrowdStrikeAdam Meyers
VICEROY TIGER Delivers New Zero-Day Exploit
VICEROY TIGER
2013-11-05F-SecureSnorre Fagerland
Operation Hangover: Unveiling an Indian Cyberattack Infrastructure
VICEROY TIGER
2013-10-31FireEyeNed Moran, Thoufique Haq
Know Your Enemy: Tracking A Rapidly Evolving APT Actor
Bozok Poison Ivy TEMPER PANDA
2013-10-29RSA ConferenceJaromír Hořejší, Peter Kálnai
Dissecting Banking Trojan Carberp
Carberp
2013-10-16CrowdStrikeAdam Meyers
CrowdCasts Monthly: You Have an Adversary Problem
ELECTRIC PANDA GIBBERISH PANDA TEST PANDA
2013-10-14Trend MicroSabrina Lei Sioting
PE_MOFKSYS.A
Mofksys
2013-10-10CrowdStrikeMatt Dahl
Regional Conflict and Cyber Blowback
Corsair Jackal
2013-10-01MALWARE ConferenceBrett Stone-Gross, Christian Rossow, Daniel Plohmann, Dennis Andriesse, Herbert Bos
Highly Resilient Peer-to-Peer Botnets Are Here: An Analysis of Gameover Zeus
Gameover P2P