Click here to download all references as Bib-File.•
2015-07-30
⋅
ESET Research
⋅
Operation Potao Express: Analysis of a cyber‑espionage toolkit FakeTC |
2015-07-30
⋅
ESET Research
⋅
Operation Potao Express: Analysis of a cyber‑espionage toolkit FakeTC |
2015-07-30
⋅
ESET Research
⋅
Operation Potao Express: Analysis of a cyber‑espionage toolkit FakeTC |
2015-07-30
⋅
ESET Research
⋅
Operation Potao Express: Analysis of a cyber‑espionage toolkit FakeTC |
2015-07-29
⋅
Youtube (FireEye Inc.)
⋅
HAMMERTOSS: Stealthy Tactics Define a Russian Cyber Threat Group tDiscoverer |
2015-07-01
⋅
FireEye
⋅
HAMMERTOSS: Stealthy Tactics Define a Russian Cyber Threat Group tDiscoverer APT29 |
2015-06-24
⋅
Spiceworks
⋅
Stealthy Cyberespionage Campaign Attacks With Social Engineering NanHaiShu |
2015-06-19
⋅
London South East
⋅
Russian Hackers Suspected In Cyberattack On German Parliament APT28 |
2015-06-19
⋅
London South East
⋅
Russian Hackers Suspected In Cyberattack On German Parliament |
2015-06-16
⋅
Palo Alto Networks Unit 42
⋅
Operation Lotus Blossom: A New Nation-State Cyberthreat? LOTUS PANDA |
2015-06-10
⋅
Kaspersky Labs
⋅
The Mystery of Duqu 2.0: a sophisticated cyberespionage actor returns DuQu Unit 8200 |
2015-06-03
⋅
ClearSky
⋅
Thamar Reservoir – An Iranian cyber-attack campaign against targets in the Middle East Rocket Kitten |
2015-06-03
⋅
ClearSky
⋅
Thamar Reservoir – An Iranian cyber-attack campaign against targets in the Middle East SamSam |
2015-06-01
⋅
CrowdStrike
⋅
Rhetoric Foreshadows Cyber Activity in the South China Sea APT23 |
2015-04-28
⋅
LookingGlass
⋅
Operation Armageddon: Cyber Espionage as a Strategic Component of Russian Modern Warfare Gamaredon Group |
2015-04-15
⋅
FireEye
⋅
APT30 and the Mechanics of a Long-Running Cyber Espionage Campaign backspace FLASHFLOOD NETEAGLE SHIPSHAPE SPACESHIP APT30 |
2015-04-15
⋅
Ars Technica
⋅
Elite cyber crime group strikes back after attack by rival APT gang APT15 |
2015-04-13
⋅
CrowdStrike
⋅
Cyber Deterrence in Action? A story of one long HURRICANE PANDA campaign HURRICANE PANDA |
2015-04-13
⋅
CrowdStrike
⋅
Cyber Deterrence in Action? A story of one long HURRICANE PANDA campaign HURRICANE PANDA |
2015-04-01
⋅
FireEye
⋅
APT30 AND THE MECHANICS OF A LONG-RUNNING CYBER ESPIONAGE OPERATION BACKBEND backspace CREAMSICLE FLASHFLOOD GEMCUTTER MILKMAID Naikon NETEAGLE ORANGEADE SHIPSHAPE SPACESHIP SslMM Sys10 WinMM xsPlus APT30 |