Click here to download all references as Bib-File.•
2014-08-20
⋅
ThisIsSecurity
⋅
Command Line Confusion Poweliks |
2014-08-20
⋅
Kaspersky Labs
⋅
“El Machete” Machete El Machete |
2014-08-19
⋅
APT Gang Branches Out to Medical Espionage in Community Health Breach APT18 |
2014-08-14
⋅
Palo Alto Networks Unit 42
⋅
Hunting the Mutex Allaple |
2014-08-13
⋅
FireEye
⋅
Operation Saffron Rose APT15 |
2014-08-13
⋅
FireEye
⋅
OPERATION SAFFRON ROSE Flying Kitten |
2014-08-11
⋅
⋅
mht, MS12-27 and * malware * .info Coreshell |
2014-08-08
⋅
FireEye
⋅
Sidewinder Targeted Attack Against Android in the Golden Age of AD Libraries RAZOR TIGER |
2014-08-07
⋅
Kaspersky Labs
⋅
The Epic Turla Operation Cobra Carbon System Uroburos Wipbot Turla |
2014-08-07
⋅
The Guardian
⋅
Sophisticated 'Turla' hackers spying on European governments, say researchers Turla |
2014-08-07
⋅
Kaspersky Labs
⋅
The Epic Turla Operation Turla |
2014-08-07
⋅
Secureworks
⋅
Malware Analysis of the Lurk Downloader Lurk |
2014-08-07
⋅
NetScout
⋅
Innaput Actors Utilize Remote Access Trojan Since 2016, Presumably Targeting Victim Files InnaputRAT |
2014-08-04
⋅
Palo Alto Networks Unit 42
⋅
New Release: Decrypting NetWire C2 Traffic NetWire RC |
2014-08-01
⋅
Coding and Security
⋅
Soraya Malware Analysis - Dropper soraya |
2014-07-31
⋅
G Data
⋅
Poweliks: the persistent malware without a file Poweliks |
2014-07-31
⋅
FireEye
⋅
Spy of the Tiger paladin APT24 |
2014-07-18
⋅
Virus Bulletin
⋅
Bird's nest neshta |
2014-07-16
⋅
StopMalvertising
⋅
Mini Analysis of the TinyBanker Tinba Tinba |
2014-07-15
⋅
Palo Alto Networks Unit 42
⋅
Unit 42 Technical Analysis: Seaduke SEADADDY |