Click here to download all references as Bib-File.•
| 2016-01-01
⋅
Verint
⋅
An Intelligence-Driven Approach to Cyber Defense Gelsemium |
| 2016-01-01
⋅
CrowdStrike
⋅
Intelligence Report: Emergence and Development of Core Bot Corebot BOSON SPIDER |
| 2016-01-01
⋅
Group-IB
⋅
Analysis of Attacks against Trading and Bank Card Systems Ranbyus |
| 2016-01-01
⋅
Palo Alto Networks Unit 42
⋅
Unit 42 Playbook Viewer OilRig |
| 2016-01-01
⋅
⋅
Emsisoft
⋅
Die erste Ransomware in JavaScript: Ransom32 Enrume |
| 2016-01-01
⋅
Virus Bulletin
⋅
Notes on click fraud: American story Alureon ZeroAccess |
| 2016-01-01
⋅
Group-IB
⋅
Cron has fallen TinyZ |
| 2016-01-01
⋅
Palo Alto Networks Unit 42
⋅
SILVERTERRIER SilverTerrier |
| 2016-01-01
⋅
Cysinfo
⋅
CYBER ATTACK IMPERSONATING IDENTITY OF INDIAN THINK TANK TO TARGET CENTRAL BUREAU OF INVESTIGATION (CBI) AND POSSIBLY INDIAN ARMY OFFICIALS Operation C-Major |
| 2016-01-01
⋅
Forcepoint
⋅
Analysis of a Botnet Campaign Jaku |
| 2016-01-01
⋅
Cymmetria
⋅
Unveiling Patchwork: The Copy-Paste APT QUILTED TIGER |
| 2016-01-01
⋅
BAE Systems
⋅
The Return of Qbot QakBot |
| 2016-01-01
⋅
ClearSky
⋅
Operation DustySky Molerats |
| 2016-01-01
⋅
FireEye
⋅
MATRYOSHKA MINING APT28 |
| 2015-12-31
⋅
Overseas "Dark Inn" organization launched an APT attack on executives of domestic enterprises DarkHotel |
| 2015-12-30
⋅
CrowdStrike
⋅
Bringing A Cannon To A Knife Fight |
| 2015-12-30
⋅
SANS
⋅
Current Reporting on the Cyber Attack in Ukraine Resulting in Power Outage Sandworm |
| 2015-12-26
⋅
Google
⋅
APT Groups and Operations ONHAT |
| 2015-12-26
⋅
Flashpoint
⋅
Backdoor: Win32/Hesetox.A: vSkimmer POS Malware Analysis vSkimmer |
| 2015-12-22
⋅
Johannes Bader's Blog
⋅
Kraken's two Domain Generation Algorithms Oderoor |