Click here to download all references as Bib-File.

Enter keywords to filter the library entries below or Propose new Entry
2015-07-16Trend MicroJay Yaneza
GamaPoS: The Andromeda Botnet Connection
gamapos
2015-07-14Kaspersky LabsFedor Sinitsyn
TeslaCrypt 2.0 disguised as CryptoWall
TeslaCrypt
2015-07-13SymantecA L Johnson
“Forkmeiamfamous”: Seaduke, latest weapon in the Duke armory
SEADADDY
2015-07-13Malwarebyteshasherezade
Revisiting The Bunitu Trojan
Bunitu
2015-07-10ESET ResearchESET Research
Sednit APT Group Meets Hacking Team
2015-07-08SymantecSymantec Security Response
Butterfly: Profiting from high-level corporate attacks
WildNeutron
2015-07-08Kaspersky LabsGReAT
Wild Neutron – Economic espionage threat actor returns with new tricks
JripBot
2015-07-08Kaspersky LabsGReAT
Wild Neutron – Economic espionage threat actor returns with new tricks
WildNeutron
2015-07-08InfosecPierluigi Paganini
Animal Farm APT and the Shadow of French Intelligence
SNOWGLOBE
2015-07-07FireEyeSudeep Singh, Yu Wang
Dyre Banking Trojan Exploits CVE-2015-0057
Dyre
2015-07-05ViceLorenzo Franceschi-Bicchierai
Spy Tech Company 'Hacking Team' Gets Hacked
Hacking Team
2015-07-02InfoSec InstituteShaman Vilen
Win32/Lethic Botnet Analysis
2015-07-01Trend MicroJay Yaneza
GamaPoS
winlog
2015-07-01FireEyeFireEye Threat Intelligence
HAMMERTOSS: Stealthy Tactics Define a Russian Cyber Threat Group
tDiscoverer APT29
2015-06-26Hanan Natan
Rovnix Payload Analysis
ReactorBot
2015-06-25ProofpointProofpoint Staff
Sundown EK Spreads LuminosityLink RAT: Light After Dark
Luminosity RAT
2015-06-24MalwarebytesJérôme Segura
Elusive HanJuan EK Drops New Tinba Version (updated)
Fobber
2015-06-24SpiceworksChris Miller
Stealthy Cyberespionage Campaign Attacks With Social Engineering
NanHaiShu
2015-06-23ReutersJoseph Menn, Sarah N. Lynch
Exclusive: SEC hunts hackers who stole corporate emails to trade stocks
WOLF SPIDER
2015-06-23FireEyeDan Caselden, Erica Eng
Operation Clandestine Wolf – Adobe Flash Zero-Day in APT3 Phishing Campaign
APT3