Click here to download all references as Bib-File.•
2015-08-05
⋅
Secureworks
⋅
Threat Group 3390 Cyberespionage APT27 |
2015-08-05
⋅
Secureworks
⋅
Threat Group 3390 Cyberespionage |
2015-07-29
⋅
Youtube (FireEye Inc.)
⋅
HAMMERTOSS: Stealthy Tactics Define a Russian Cyber Threat Group tDiscoverer |
2015-07-08
⋅
Kaspersky Labs
⋅
Wild Neutron – Economic espionage threat actor returns with new tricks JripBot |
2015-07-08
⋅
Kaspersky Labs
⋅
Wild Neutron – Economic espionage threat actor returns with new tricks WildNeutron |
2015-07-01
⋅
FireEye
⋅
HAMMERTOSS: Stealthy Tactics Define a Russian Cyber Threat Group tDiscoverer APT29 |
2015-05-13
⋅
Cylance
⋅
Cylance SPEAR Team: A Threat Actor Resurfaces GreenShaitan |
2015-05-04
⋅
Cisco Talos
⋅
Threat Spotlight: Rombertik – Gazing Past the Smoke, Mirrors, and Trapdoors Rombertik |
2015-04-27
⋅
Cisco Talos
⋅
Threat Spotlight: TeslaCrypt – Decrypt It Yourself TeslaCrypt |
2015-03-30
⋅
Symantec
⋅
New reconnaissance threat Trojan.Laziok targets the energy sector Laziok |
2015-03-20
⋅
Cisco Talos
⋅
Threat Spotlight: PoSeidon, A Deep Dive Into Point of Sale Malware FindPOS |
2015-02-25
⋅
Trend Micro
⋅
OPERATION ARID VIPER: Bypassing the Iron Dome AridViper |
2015-02-10
⋅
CrowdStrike
⋅
Global Threat Intel Report MAGNETIC SPIDER PALE PANDA PREDATOR PANDA SABRE PANDA SPICY PANDA WET PANDA |
2015-02-06
⋅
CrowdStrike
⋅
CrowdStrike Global Threat Intel Report 2014 BlackPOS CryptoLocker Derusbi Elise Enfal EvilGrab Gameover P2P HttpBrowser Medusa Mirage Naikon NetTraveler pirpi PlugX Poison Ivy Sakula RAT Sinowal sykipot taidoor |
2015-02-01
⋅
Trend Micro
⋅
Operation Arid Viper - Bypassing the Iron Dome |
2014-10-28
⋅
Novetta
⋅
Operation SMN: Axiom Threat Actor Group Report BLACKCOFFEE Derusbi HiKit |
2014-10-28
⋅
Cisco
⋅
Threat Spotlight: Group 72, Opening the ZxShell ZXShell |
2014-05-28
⋅
iSIGHT Partners (FireEye)
⋅
NEWSCASTER: An Iranian Threat Within Social Networks Charming Kitten |
2014-05-01
⋅
Arbor Networks
⋅
Into the Light of Day:Uncovering Ongoing and Historical Point of Sale Malware and Attack Campaigns poscardstealer |
2014-02-14
⋅
Secureworks
⋅
Analysis of DHS NCCIC Indicators jspRAT BeepService DDKeylogger LinseningSvr ONHAT SimpleFileMover ZiyangRAT |