Click here to download all references as Bib-File.•
| 2013-12-12
⋅
FireEye Inc
⋅
OPERATION “KE3CHANG”:Targeted Attacks Against Ministries of Foreign Affairs Tidepool APT15 |
| 2013-12-12
⋅
Checkpoint
⋅
Malware Research Group HIMAN Malware Analysis himan |
| 2013-12-11
⋅
Norman Shark
⋅
The Chinese Malware Complexes: The Maudi Surveillance Operation Maudi |
| 2013-12-09
⋅
Trustwave
⋅
The Curious Case of the Malicious IIS Module IISniff |
| 2013-12-05
⋅
ESET Research
⋅
Did you sayAdvanced Persistent Threats? Terminator RAT |
| 2013-12-04
⋅
Cisco Talos
⋅
The Internet of Everything, Including Malware Zollard |
| 2013-11-10
⋅
FireEye
⋅
Operation Ephemeral Hydra: IE Zero-Day Linked to DeputyDog Uses Diskless Method 9002 RAT |
| 2013-11-09
⋅
T-cmd.cpp T-Cmd |
| 2013-11-06
⋅
CrowdStrike
⋅
VICEROY TIGER Delivers New Zero-Day Exploit VICEROY TIGER |
| 2013-11-05
⋅
F-Secure
⋅
Operation Hangover: Unveiling an Indian Cyberattack Infrastructure VICEROY TIGER |
| 2013-11-02
⋅
The MalwareMustDie Blog
⋅
RunForrestRun DGA "Comeback" with new obfuscation RunForestRun |
| 2013-10-31
⋅
FireEye
⋅
Know Your Enemy: Tracking A Rapidly Evolving APT Actor Bozok Poison Ivy TEMPER PANDA |
| 2013-10-29
⋅
RSA Conference
⋅
Dissecting Banking Trojan Carberp Carberp |
| 2013-10-16
⋅
CrowdStrike
⋅
CrowdCasts Monthly: You Have an Adversary Problem ELECTRIC PANDA GIBBERISH PANDA TEST PANDA |
| 2013-10-14
⋅
Trend Micro
⋅
PE_MOFKSYS.A Mofksys |
| 2013-10-10
⋅
CrowdStrike
⋅
Regional Conflict and Cyber Blowback Corsair Jackal |
| 2013-10-04
⋅
Symantec
⋅
ZeroAccess Indepth ZeroAccess |
| 2013-10-01
⋅
MALWARE Conference
⋅
Highly Resilient Peer-to-Peer Botnets Are Here: An Analysis of Gameover Zeus Gameover P2P |
| 2013-09-26
⋅
Malwarebytes
⋅
New Solarbot Malware Debuts, Creator Publicly Advertising Solarbot |
| 2013-09-25
⋅
Avast
⋅
Win32/64:Napolar: New Trojan shines on the cyber crime-scene Solarbot |