Click here to download all references as Bib-File.

Enter keywords to filter the library entries below or Propose new Entry
2016-01-01CrowdStrikeChristopher Scott, Wendi Whitmore
Detecting and Responding: Pandas and Bears
ELOQUENT PANDA UNION PANDA
2016-01-01VerintPeikan Tsung
An Intelligence-Driven Approach to Cyber Defense
Gelsemium
2016-01-01CrowdStrikeCrowdStrike
Intelligence Report: Emergence and Development of Core Bot
Corebot BOSON SPIDER
2016-01-01Group-IBGroup-IB
Analysis of Attacks against Trading and Bank Card Systems
Ranbyus
2016-01-01Palo Alto Networks Unit 42paloalto Networks: Unit42
Unit 42 Playbook Viewer
OilRig
2016-01-01EmsisoftSarah
Die erste Ransomware in JavaScript: Ransom32
Enrume
2016-01-01Virus BulletinJaromír Hořejší, Peter Kálnai
Notes on click fraud: American story
Alureon ZeroAccess
2016-01-01Group-IBGroup-IB
Cron has fallen
TinyZ
2016-01-01Palo Alto Networks Unit 42Peter Renals, Simon Conant
SILVERTERRIER
SilverTerrier
2016-01-01CysinfoMonnappa K A
CYBER ATTACK IMPERSONATING IDENTITY OF INDIAN THINK TANK TO TARGET CENTRAL BUREAU OF INVESTIGATION (CBI) AND POSSIBLY INDIAN ARMY OFFICIALS
Operation C-Major
2016-01-01ForcepointAbel Toro, Andy Settle, Bapadittya Dey, Nicholas Griffin
Analysis of a Botnet Campaign
Jaku
2016-01-01CymmetriaCymmetria
Unveiling Patchwork: The Copy-Paste APT
QUILTED TIGER
2016-01-01BAE SystemsBAE Systems
The Return of Qbot
QakBot
2016-01-01ClearSkyClearSky Research Team
Operation DustySky
Molerats
2016-01-01FireEyeMichael Bailey
MATRYOSHKA MINING
APT28
2015-12-31ThreatBook
Overseas "Dark Inn" organization launched an APT attack on executives of domestic enterprises
DarkHotel
2015-12-30CrowdStrikeAdam Kozy, Johannes Gilger
Bringing A Cannon To A Knife Fight
2015-12-30SANSMichael J. Assante
Current Reporting on the Cyber Attack in Ukraine Resulting in Power Outage
Sandworm
2015-12-26GoogleVarious
APT Groups and Operations
ONHAT
2015-12-26FlashpointVitali Kremez
Backdoor: Win32/Hesetox.A: vSkimmer POS Malware Analysis 
vSkimmer