Click here to download all references as Bib-File.

Enter keywords to filter the library entries below or Propose new Entry
2012-01-01CSIS Trend MicroFeike Hacquebord (Trend Micro), Peter Kruse (CSIS), Robert McArdle (Trend Micro)
W32.Tinba (Tinybanker) The Turkish Incident
Tinba
2012-01-01SymantecNicolas Falliere
W32.Qakbot in Detail
QakBot
2011-12-209bplusadmin
Analyzing CVE-2011-4369 – Part One
Evilbunny
2011-12-11Open Security ResearchMichael G. Spohn.
Intro. To Reversing - W32Pinkslipbot
QakBot
2011-12-08SymantecVikram Thakur
The Sykipot Attacks
sykipot
2011-11-23SymantecSymantec
W32.Duqu: The precursor to the next Stuxnet
DuQu
2011-11-11Project2049Jenny Lin, L.C. Russell Hsiao, Mark A. Stokes
The Chinese People’s Liberation Army Signals Intelligence and Cyber Reconnaissance Infrastructure
2011-10-31Trend MicroNart Villeneuve
The Significance of the "Nitro" Attacks
Nitro
2011-10-26IntegoPeter James
Tsunami Backdoor Can Be Used for Denial of Service Attacks
Tsunami
2011-10-17FortiGuard LabsFortiGuard
W32/Yunsip!tr.pws
Yunsip
2011-10-14SANSFrankie Fu Kay Li
A Detailed Analysis of an Advanced Persistent Threat Malware
ProjectWood
2011-10-13Frankie Fu Kay Li
A Detailed Analysis of an Advanced Persistent Threat Malware
woody
2011-10-08CCCCCC
ANALYSE EINER REGIERUNGS-MALWARE
Bundestrojaner
2011-10-08F-SecureMikko
Possible Governmental Backdoor Found ("Case R2D2")
Bundestrojaner
2011-10-07Contagiodump BlogMila Parkour
Rustock samples and analysis links. Rustock.C, E, I, J and other variants
Rustock
2011-10-06Kaspersky LabsDenis Maslennikov
ZeuS-in-the-Mobile – Facts and Theories
ZitMo
2011-10-06Contagio DumpMila Parkour
Sep 28 CVE-2010-3333 Manuscript with Taidoor (Trojan.Matryoshka by CyberESI)
taidoor
2011-09-27malwareninja
Debugging Injected Code with IDA Pro
Shylock
2011-09-21Contagiodump BlogMila Parkour
Sept 21 Greedy Shylock - financial malware
Shylock
2011-09-19Contagio DumpMila Parkour
Mebromi BIOS rootkit affecting Award BIOS (aka "BMW" virus)
Mebromi