Click here to download all references as Bib-File.

Enter keywords to filter the library entries below or Propose new Entry
2013-01-14Kaspersky LabsGReAT
The “Red October” Campaign – An Advanced Cyber Espionage Network Targeting Diplomatic and Government Agencies
Inception Framework
2013-01-14Kaspersky LabsGReAT
"Red October" Diplomatic Cyber Attacks Investigation
Inception Framework
2013-01-01McAfeeItai Liba, James Walter, Ryan Sherstobitoff
Dissecting Operation Troy: Cyberespionage in South Korea
httpdropper
2013-01-01McAfeeItai Liba, James Walter, Ryan Sherstobitoff
Dissecting Operation Troy: Cyberespionage in South Korea
httpdropper
2013-01-01McAfeeItai Liba, James Walter, Ryan Sherstobitoff
Dissecting Operation Troy: Cyberespionage in South Korea
httpdropper
2012-11-05MalwarebytesJérôme Segura
Citadel: a cyber-criminal’s ultimate weapon?
Citadel
2012-09-18PastebinQassamCyberFighters
QassamCyberFighters's Pastebin
Cyber fighters of Izz Ad-Din Al Qassam
2012-08-10Contagiodump BlogMila Parkour
Gauss samples - Nation-state cyber-surveillance + Banking trojan
Gauss
2012-07-17Kaspersky LabsKaspersky
Kaspersky Lab and Seculert Announce ‘Madi,’ a Newly Discovered Cyber-Espionage Campaign in the Middle East
Madi
2012-01-13Middle East OnlineMiddle East Online
Cyber war: 'Gaza hackers' deface Israel fire service website
Molerats
2011-11-11Project2049Jenny Lin, L.C. Russell Hsiao, Mark A. Stokes
The Chinese People’s Liberation Army Signals Intelligence and Cyber Reconnaissance Infrastructure
2011-11-11Project2049Jenny Lin, L.C. Russell Hsiao, Mark A. Stokes
The Chinese People’s Liberation Army Signals Intelligence and Cyber Reconnaissance Infrastructure
2011-11-11Project2049Jenny Lin, L.C. Russell Hsiao, Mark A. Stokes
The Chinese People’s Liberation Army Signals Intelligence and Cyber Reconnaissance Infrastructure
2011-10-06Contagio DumpMila Parkour
Sep 28 CVE-2010-3333 Manuscript with Taidoor (Trojan.Matryoshka by CyberESI)
taidoor
2011-07-06Kaspersky LabsVyacheslav Zakorzhevsky
Cybercriminals switch from MBR to NTFS
Rovnix
2011-02-10McAfeeMcAfee Foundstone Professional Services, McAfee Labs
Global Energy Cyberattacks: “Night Dragon”
Night Dragon
2011-02-10McAfeeMcAfee Foundstone Professional Services, McAfee Labs
Global Energy Cyberattacks: “Night Dragon”
Night Dragon
2011-01-01The Brown Journal of World AffairsJason Healey
The Spectrum of National Responsibility for Cyberattacks
2010-04-06CitizenLabCitizenLab, Information Warfare Monitor, Shadowserver Foundation
SHADOWS IN THE CLOUD: Investigating Cyber Espionage 2.0
Shadow Network
2010-04-06CitizenLabCitizenLab, Information Warfare Monitor, Shadowserver Foundation
SHADOWS IN THE CLOUD: Investigating Cyber Espionage 2.0
Shadow Network
2010-04-06CitizenLabCitizenLab, Information Warfare Monitor, Shadowserver Foundation
SHADOWS IN THE CLOUD: Investigating Cyber Espionage 2.0
Shadow Network
2009-07-08The GuardianMatthew Weaver
Cyber attackers target South Korea and US
Lazarus Group
2009-03-28Infinitum LabsInformation Warfare Monitor
Tracking GhostNet: Investigating a Cyber Espionage Network
Ghost RAT GhostNet