Click here to download all references as Bib-File.

Enter keywords to filter the library entries below or Propose new Entry
2014-11-10Trend MicroWilliam Gamazo Sanchez
Timeline of Sandworm Attacks
Sandworm
2014-11-10Kaspersky LabsGReAT
The Darkhotel APT
DarkHotel
2014-11-10Kaspersky LabsGReAT
The Darkhotel APT
DarkHotel
2014-11-10Blaze's Security BlogBartBlaze
Thoughts on Absolute Computrace
Computrace
2014-11-08How-To-Hack.netH4ck
Review of jSpy a RAT from jSpy.net
jSpy
2014-11-04BitBucketDaniel Plohmann
IDApatchwork Repository
Nymaim
2014-11-03Kaspersky LabsKurt Baumgartner, Maria Garnaeva
BE2 custom plugins, router abuse, and target profiles
BlackEnergy
2014-11-01NovettaNovetta
ZoxPNG Analysis
BLACKCOFFEE
2014-10-31G DataG Data
OPERATION “TOOHASH”: HOW TARGETED ATTACKS WORK
Cohhoc ProjectWood Gelsemium
2014-10-30G DataG Data
COM Object hijacking: the discreet way of persistence
COMpfun
2014-10-28NovettaNovetta
Derusbi (Server Variant) Analysis
Derusbi
2014-10-28CiscoAlain Zidouemba, Andrea Allievi, Douglas Goddard, Shaun Hurley
Threat Spotlight: Group 72, Opening the ZxShell
ZXShell
2014-10-27Trend MicroAlfred Remorin, Douglas Otis, Feike Hacquebord, Fernando Mercês, Jim Gogolinski, Loucif Kharouni, Numaan Huq
Operation Pawn Storm: Using Decoys to Evade Detection
Sedreco Seduploader APT28
2014-10-27PWCChris Doman, Tom Lancaster
ScanBox framework – who’s affected, and who’s using it?
Jolob
2014-10-27NetresecErik Hjelmvik
Full Disclosure of Havex Trojans
ENERGETIC BEAR
2014-10-22Kaspersky LabsАртём Семенченко, Татьяна Куликова, Федор Синицын
Шифровальщик Cryakl или Фантомас разбушевался
Cryakl
2014-10-20PWCDan Kelly, Tom Lancaster
OrcaRAT - A whale of a tale
OrcaRAT
2014-10-15ESET ResearchOlivier Bilodeau
Operation Windigo: “Good job, ESET!” says malware author
Ebury
2014-10-14CrowdStrikeDmitri Alperovitch
CrowdStrike Discovers Use of 64-bit Zero-Day Privilege Escalation Exploit (CVE-2014-4113) by Hurricane Panda
HURRICANE PANDA
2014-10-14SymantecSymantec Security Response
Security vendors take action against Hidden Lynx malware
Gameover P2P HiKit Shylock APT17