Click here to download all references as Bib-File.

Enter keywords to filter the library entries below or Propose new Entry
2014-01-01Fraunhofer FKIEDaniel Plohmann
Patchwork: Stitching against malware families with IDA Pro
Nymaim
2014-01-01nvisoErik Van Buggenhout
A history of ATM violence
NVISOSPIT
2014-01-01FireEyeFireEye
APT28
Coreshell Sedreco X-Agent
2014-01-01Palo Alto Networks Unit 42paloalto Networks: Unit42
WIRELURKER: A New Era in iOS and OS X Malware
WireLurker WireLurker
2014-01-01Airbus Defence & SpaceCedric Pernet, David Bizeul, Fabien Perigaud, Ivan Fontarensky, Ronan Mouchoux
The Eye of the Tiger
paladin PittyTiger RAT
2014-01-01Trend MicroUnknownUnknown
Targeted Attack Trends in Asia-Pacific
Elise
2014-01-01FireEyeFireEye
APT28: A Windows into Russia's Cyber Espionage Operations?
OLDBAIT
2013-12-31VirusTotalVirusTotal
VirusTotal Report for Bee
Bee
2013-12-18SecureworksKeith Jarvis
CryptoLocker Ransomware
CryptoLocker
2013-12-18ESET ResearchJean-Ian Boutin
Qadars – a banking Trojan with the Netherlands in its sights
Qadars
2013-12-17Gdata
Bebloh – a well-known banking Trojan with noteworthy innovations
UrlZone
2013-12-12FireEye IncJames T. Bennett, Kenneth Geers, Mike Scott, Nart Villeneuve, Ned Moran, Thoufique Haq
OPERATION “KE3CHANG”:Targeted Attacks Against Ministries of Foreign Affairs
Tidepool APT15
2013-12-12CheckpointCheckpoint
Malware Research Group HIMAN Malware Analysis
himan
2013-12-11Norman SharkSnorre Fagerland
The Chinese Malware Complexes: The Maudi Surveillance Operation
Maudi
2013-12-09TrustwaveJosh Grunzweig
The Curious Case of the Malicious IIS Module
IISniff
2013-12-05ESET ResearchESET Research
Did you sayAdvanced Persistent Threats?
Terminator RAT
2013-12-04Cisco TalosCraig Williams
The Internet of Everything, Including Malware
Zollard
2013-11-10FireEyeMike Scott, Ned Moran, Sai Omkar Vashisht, Thoufique Haq
Operation Ephemeral Hydra: IE Zero-Day Linked to DeputyDog Uses Diskless Method
9002 RAT
2013-11-09TOo2y
T-cmd.cpp
T-Cmd
2013-11-06CrowdStrikeAdam Meyers
VICEROY TIGER Delivers New Zero-Day Exploit
VICEROY TIGER