Click here to download all references as Bib-File.•
2013-05-17
⋅
Trustwave
⋅
Alina: Following The Shadow Part 1 Alina POS |
2013-05-08
⋅
SpiderLabs Blog
⋅
Alina: Casting a Shadow on POS Alina POS |
2013-05-03
⋅
CrowdStrike
⋅
Department of Labor Strategic Web Compromise APT19 |
2013-05-02
⋅
ESET Research
⋅
The stealthiness of Linux/Cdorked: a clarification CDorked |
2013-05-01
⋅
Norman Shark
⋅
Operation Hangover Smackdown |
2013-05-01
⋅
Cisco
⋅
Linux/CDorked FAQs CDorked |
2013-04-30
⋅
Symantec
⋅
Linux.Cdorked CDorked |
2013-04-26
⋅
ESET Research
⋅
Linux/Cdorked.A: New Apache backdoor being used in the wild to serve Blackhole CDorked |
2013-04-24
⋅
South Korea Incident - New Malware samples concealment_troy httpdropper http_troy |
2013-04-12
⋅
CrowdStrike
⋅
Who is Samurai Panda SAMURAI PANDA |
2013-04-11
⋅
Kaspersky Labs
⋅
Winnti. More than just a game APT41 |
2013-04-11
⋅
Kaspersky Labs
⋅
Winnti FAQ. More Than Just a Game APT41 |
2013-04-08
⋅
Avast
⋅
Banking Trojan Carberp: An Epitaph? Carberp |
2013-04-04
⋅
CrowdStrike
⋅
Who is Clever Kitten Clever Kitten |
2013-04-02
⋅
Dark South Korea Total War Review SHARPKNOT |
2013-04-01
⋅
FireEye
⋅
Trojan.APT.BaneChant: In-Memory Trojan That Observes for Multiple Mouse Clicks |
2013-04-01
⋅
VISA
⋅
Payment Processing Threats Impacting Grocery Store Merchants Apocalipto |
2013-04-01
⋅
Kaspersky Labs
⋅
Winnti - More than just a game portless Winnti |
2013-03-30
⋅
0xEBFE Blog about life
⋅
Fooled by Andromeda Andromeda |
2013-03-29
⋅
CrowdStrike
⋅
Whois Numbered Panda APT12 |